Watch this video on YouTube
What is the MOST effective indicator of the maturity level of an information security monitoring program?