In an organization undergoing digital transformation, various departments are rapidly adopting new technologies. As the Information Security Manager, what's the most effective way to ensure these technologies are in compliance with security policies?