Watch this video on YouTube
What is the primary purpose of risk assessment in information security management?