Watch this video on YouTube
How should an information security manager prioritize resource allocation for the development of a security architecture?