Which of the following methods BEST ensures that a comprehensive approach is used to direct information security activities?
A. Holding periodic meetings with business owners
B. Promoting security training
C. Establishing a steering committee
D. Creating communication channels
A. Holding periodic meetings with business owners
B. Promoting security training
C. Establishing a steering committee
D. Creating communication channels