Watch this video on YouTube
What method MOST effectively allows an information security manager to convey the proficiency of security program functions?