While reviewing your organization's cloud-based isaca video

 ·  PT1H46M27S  ·  EN

cism video for while reviewing your organization's cloud-based customer database, you've detected suspicious activity that might indicate unauthorized access.

Answer

Full Certification Question

While reviewing your organization's cloud-based customer database, you've detected suspicious activity that might indicate unauthorized access. As the lead security manager, what would be your INITIAL course of action to address this situation?