Charting path to information security