Watch this video on YouTube
Which approach is MOST effective for defining personnel roles to align with the information security program's strategic objectives?