Watch this video on YouTube
What will enable the successful implementation of an information security program in a large organization that involves working with complex organizational functions?