Watch this video on YouTube
What option among the following would most effectively ensure that the information security strategy of an organization is in harmony with its business objectives?