Watch this video on YouTube
When considering emerging insider threats, what should be an information security manager's top priority to mitigate risks effectively?