On Optimizing the Path to Information Security Compliance | IEEE Conference Publication | IEEE Xplore