Week 8 Discusssion Assignment: Submit one initial post addressing the topics below, and respond to two classmate’s posts. 1. What is vulnerability assessment? 2. Who is generally involved in a vulnerability assessment? 3.If you were the CISO, what would you like to see in the vulnerability assessment report? Guidelines: Provide one post of no less […]