A company's network has been breached, and sensitive customer data may have been compromised. What is the first step in documenting this incident?
Create a detailed initial report
Create a final incident report
Immediately contact law enforcement
Delete all related log files