Watch this video on YouTube
Which of the following is a key component of effective change management in cybersecurity?