Watch this video on YouTube
Which of the following best describes the purpose of conducting a risk assessment in the context of an Information Security Management System (ISMS)?