After a significant upgrade to the encryption software used for securing data at rest in your company, what is the BEST next step to maintain the organization's security posture?
Revise the data protection policies to incorporate the new encryption standards and procedures.
Redesign access permissions across all network shares and resources.
Immediately re-train all employees on how to use the new encryption software.
Conduct a new risk assessment focused on data at rest security.