An information security manager reads a media report of a new type of malware attack. Who should be notified FIRST?
A. Security operations team
B. Data owners
C. Communications department
D. Application owners
A. Security operations team
B. Data owners
C. Communications department
D. Application owners