Watch this video on YouTube
To effectively manage the risk of social engineering attacks, what should be an information security manager's priority when engaging with senior leadership?