Vocabulary Word
Scenario:
We came across a very critical vulnerability in the system. We must act to protect our assets.
Response:
Agreed. We should implement our breach-management protocol to patch the vulnerability and strengthen security measures.
Scenario:
We've detected some suspicious activity on our network. We need to take immediate action, what are the next steps in line with our policies?
Response:
Let's activate our breach-management plan. I'll notify the security team and initiate an internal investigation as the first step.