... functional areas of physical security (access control), corporate security (investigations), and IT security (network). Upper management has an easier time understanding the security areas when they ... articles on technical security issues, and his expertise and insight help shape the editorial direction of key security publications such as the Information Security Management Handbook, for ... iterative risk management process is to reduce residual risk to an acceptable level, the risk management process may require multiple passes to reach this goal. For example, a vulnerability management...