cisa video for you are auditing HDA Inc. as an information system auditor, and while reviewing the organization's IT portfolio, you have identified multiple
You are auditing HDA Inc. as an information system auditor, and while reviewing the organization's IT portfolio, you have identified multiple applications that are not being utilized. What would be the most effective approach to prevent this situation from happening again in the future?