Session 3. Now you know WHY to make policies and WHAT they should contain… But HOW do you implement policies? And then HOW do you implement a program.
THE STRATEGY BEHIND BREAKING INTO AND DEFENDING