Watch this video on YouTube
A major breach has just occurred in your organization, affecting a critical system. As the Information Security Manager, what is the FIRST step you should take post-incident to prevent a recurrence?