Develop a Security Policy You are an ICT Security and Risk consultant and you have been approached by Globex Corp to help them recover from a cyber attack. You have successfully isolated the machines affected by the attack and brought the company’s system back into operation. You have now completed a risk assessment for Globex […]