Following a significant change to the underlying code of an application, it is MOST important for the information security manager to:
A. inform senior management
B. update the risk assessment
C. validate the user acceptance testing
D. modify key risk indicators
A. inform senior management
B. update the risk assessment
C. validate the user acceptance testing
D. modify key risk indicators