Watch this video on YouTube
Which of the following is the most effective first step in a vulnerability management program to ensure comprehensive coverage of potential security weaknesses?