Of the following, whose input is of GREATEST importance in the development of an information security strategy?
A. End users
B. Corporate auditors
C. Process owners
D. Security architects
A. End users
B. Corporate auditors
C. Process owners
D. Security architects