Appendices D and E of the NIST SP 800-37 Revision 1, “Guide for Applying the Risk Management Framework to Federal Information Systems,” provide a detailed descriiption of the roles and responsibilities of the key security players. Throughout the risk management process, it can clearly be seen that close collaboration and support are required among all the functional roles.
Respond to the following in a minimum of 175 words:
Choose two of the functional roles of the key security players in an organization and think of the role they play in creating a security plan.
Compare and contrast the outlooks of the roles you have chosen.
Explain how the two outlooks differ when creating a plan to mitigate a zero-day attack.