An organization plans to allow employees to use their own devices on the organization-s network. Which of the following is the information security manager-s BEST course of action?
A. Implement automated software
B. Assess associated risk
C. Conduct awareness training
D. Update the security policy