cism video for if an information security manager is informed that their company is being targeted by skilled hackers, what should be their first step?
If an information security manager is informed that their company is being targeted by skilled hackers, what should be their first step?