Watch this video on YouTube
Who is the most appropriate individual to ensure the absence of new vulnerabilities in an existing application during the change management process?