When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporate network…
Before conducting a formal risk assessment of an organization’s information resources, an information security manager should FIRST: