This is a dedicated watch page for a single video.
You are the Information Security Manager of HDA Inc. Following an internal control audit that revealed a control deficiency in a legacy system, where compensating controls appear ineffective, what would be the MOST effective means for you to ascertain the security requirements necessary to address the control deficiency?