Watch this video on YouTube
Which of the following BEST describes the purpose of an Information Security Program?