Watch this video on YouTube
What is the MOST effective way to evaluate the maturity level of an information security program among the options provided?