You are tasked with specifying priorities for mitigating threats to data in your organization. Given the diverse data types and storage solutions used, how would you rank the importance of encryption, access controls, and threat detection in your strategy?