This role, as a second line-of-defense, is required to work with first line-of-defense functions to identify, assess, monitor and report key IT risks.
This role, as a second line-of-defense, is required to work with first line-of-defense functions to identify, assess, monitor and report key IT risks.
2m ago
2m ago