Watch this video on YouTube
What approach should an information security manager take to justify the investment in a new security technology to senior management?