According to the CISM Review Manual, the first step to establishing an effective information security program is to create a business case that aligns the program objectives with the organization's goals and strategies. A business case provides the rationale and justification for the information security program and helps to secure the necessary resources and support from senior management and other stakeholders. A business case should include the following elements: * The scope and objectives of the information security program * The current state of information security in the organization and the gap analysis * The benefits and value proposition of the information security program * The risks and challenges of the information security program * The estimated costs and resources of the information security program * The expected outcomes and performance indicators of the information security program * The implementation plan and timeline of the information security program References = CISM Review Manual, 16th Edition, Chapter 3, Section 2, pages 97-99.