cism video for while reviewing your organization's cloud-based customer database, you've detected suspicious activity that might indicate unauthorized access.
While reviewing your organization's cloud-based customer database, you've detected suspicious activity that might indicate unauthorized access. As the lead security manager, what would be your INITIAL course of action to address this situation?