2. Business Initiated Vulnerabilities

ACT-IAC Membership Meeting Ideas

Community Member kudos icon + Community member

1. Approach cybersecurity the same way government now approaches Section 508 compliance – embed it from the start through the finish.

2. Make available a real, visualized threat dashboard to business process owners to educate them on the scope of threat in today’s environment.

Add tags and help us assess and classify your idea. Pick from the list below or type in a new tag.


1 vote
Public Input
Idea No. 130