Watch this video on YouTube
What security activities should be implemented in the change management process to identify key vulnerabilities introduced by changes?