Watch this video on YouTube
What is the most strategic consideration when selecting vulnerability metrics for an information security program?