A Chief Information Security Officer (CISO) of a major consulting firm has significantly increased
the company’s security posture; however, the company is still plagued by data breaches of
misplaced assets. These data breaches as a result have led to the compromise of sensitive
corporate and client data on at least 25 occasions. Each employee in the company is provided a
laptop to perform company business. Which of the following actions can the CISO take to mitigate
the breaches?
A.
Reload all user laptops with full disk encryption software immediately.
B.
Implement full disk encryption on all storage devices the firm owns.
C.
Implement new continuous monitoring procedures.
D.
Implement an open source system which allows data to be encrypted while processed.