Traditionally, security risk assessments have been performed by members of an organization’s IT department, excluding input from other departments. Based on what you have read, is this the most effective method to assess a company’s vulnerabilities? Examine this issue within the context of the textbook’s material on communities of interest and accountability for risk management.
No APA Format
Citations and references required