Watch this video on YouTube
What is the INITIAL task that the information security manager must undertake when a vulnerability is identified in the facilities offered by an IT service provider?