This is a dedicated watch page for a single video.
In the middle of a major digital transformation, as the Information Security Manager, you discover a potential misalignment between a new application's design and the organization's security requirements. What is the most prudent course of action?