Watch this video on YouTube
What is the best method or technique to ensure the effective implementation of an information security program?