Watch this video on YouTube
Who is the MOST suitable person to verify that new vulnerabilities have not been introduced into an existing application during the change management process?