Watch this video on YouTube
How should information security managers utilize risk assessment techniques?