Does your organization’s incident response team or individual keep documentation of security incidents, their outcomes, including weaknesses exploited and how access to information was gained? by Mackenzie Foster | Aug 14, 2015 Instructions: –If yes, select Yes below and describe your supporting documents. –If no, select No below.
Recent Comments