Watch this video on YouTube
Which of the following best describes the purpose of change management in cybersecurity?