Watch this video on YouTube
Your organization is considering the adoption of a new software development methodology. As an Information Security Manager, how would you prioritize security considerations during the transition phase?