An organization that has outsourced its incident management capabilities just discovered a significant privacy breach by an unknown attacker. Which of the following is the MOST important action of the information security manager?
A. Follow the outsourcer’s response plan.
B. Alert the appropriate law enforcement authorities.
C. Refer to the organization’s response plan.
D. Notify the outsourcer of the privacy breach.
A. Follow the outsourcer’s response plan.
B. Alert the appropriate law enforcement authorities.
C. Refer to the organization’s response plan.
D. Notify the outsourcer of the privacy breach.