Watch this video on YouTube
In a decentralized organization, the information security manager notices inconsistent application of security policies across business units. Which of the following would be the best course of action to ensure a unified approach to security?