Watch this video on YouTube
What is an example of an organization implementing additional security controls to address the risks of a new process?