Watch this video on YouTube
When developing an information security governance framework, what should be the initial activity?