Watch this video on YouTube
After a significant change to the underlying code of an application, what is most important for the information security manager to do?