Watch this video on YouTube
The IT team of your organization has detected suspicious network activity that indicates a potential security breach. Which team is responsible for handling this situation as part of the cybersecurity process?