cism video for when tasked with developing a change control process, what should be the first step for an information security manager?
When tasked with developing a change control process, what should be the first step for an information security manager?