Individuals who plan, coordinate and implement the organization's information security. They educate users on computer security, install virus protection software and firewalls, monitor the network for security breaches, respond to cyber attacks and, in some cases, gather data and evidence to be used in prosecuting cyber crime.
No programs.