Watch this video on YouTube
When assigning confidentiality levels to information assets, which element should an information security manager consider first to align with emerging threats?