Description
Once a security weakness or event has been reported it is important that it is responded to and actioned, otherwise it will get worse and become a breach. Our template covers confirming and verifying the report, determining and implementing an appropriate response and reviewing and documenting that response.