Identify a case where a company had to prepare a public response to a security incident.

 

  • Identify a case where a company had to prepare a public response to a security incident.
  • Examine and assess what happened, what vulnerability was exploited, and how the company handled the response publicly.