This message was posted by a user wishing to remain anonymous
Does anyone have a workflow for third party incident response to securtiy breaches? I'm trying to develope a process that involves various stakeholdets fromsupplychain legal and privacy and was hoping to not have to re-invent the wheel. It seems like there are a lot of moving parts and steps.