Which of the following actions should lake place immediately after a security breach is reported to an information security manager?
A. Confirm the incident
B. Determine impact
C. Notify affected stakeholders
D. Isolate the incident
A. Confirm the incident
B. Determine impact
C. Notify affected stakeholders
D. Isolate the incident