Watch this video on YouTube
An organization experienced a data breach, exposing sensitive customer information. What should be the initial step in the incident investigation process?