Watch this video on YouTube
How should an information security strategy address compliance requirements?