When building support for an information security program, which of the following elements is MOST important?
Identification of existing vulnerabilities
Information risk assessment
Business impact analysis (BIA)
Threat analysis
Submit