Watch this video on YouTube
What will have the highest impact on standard information security governance models?