Watch this video on YouTube
When implementing security controls, what should an information security manager primarily focus on?