cism video for a security audit reveals that a majority of security incidents in your organization stem from employees using unapproved software. As the head of
A security audit reveals that a majority of security incidents in your organization stem from employees using unapproved software. As the head of the IT security division, what would be the MOST effective approach to mitigate this risk?