Watch this video on YouTube
As an information security manager formulating a change control process, what pivotal action should you initiate?