Watch this video on YouTube
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?