An information security manager determines the organization's critical systems may be vulnerable to a new zero-day attack. The FIRST course of action is to:
Which of the following provides the MOST relevant information to determine the overall effectiveness of an information security program and underlying business processes?
Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?