Watch this video on YouTube
As you aim to weave information security into the fabric of corporate governance, which strategy should take precedence?