A critical vulnerability has been identified in one of your organization's core applications. The vulnerability could potentially allow unauthorized access to sensitive data. Due to the severity, an immediate fix is required. As the head of cybersecurity, what should be your primary approach regarding the emergency change procedure?