Imagine you're the Information Security Manager of a large financial institution that is considering a digital transformation initiative. Which activity would be paramount to ensure the anticipated technological changes don't compromise the organization's security posture?