This is a dedicated watch page for a single video.
You are the Information Security Manager of HDA Inc. You want to identify a deviation in the information security management process from widely accepted standards of good practices. What would be the most effective approach?