Watch this video on YouTube
If an organization learns of a security breach at another company using similar technology, what should the information security manager do first?