Watch this video on YouTube
What is the most fundamental requirement for an information security governance program?