White Paper: 5 Approaches to a Consistently Evolving Security Program