Watch this video on YouTube
If a business previously accepted the risk of a zero-day vulnerability and it was exploited in a high-profile attack on another organization, what should be the first course of action for the information security manager?