Watch this video on YouTube
Which activity is MOST critical when developing an information security program?