I'm not sure about the application scan results. That seems more like something an internal IT team would conduct rather than a security consultant investigating a breach.
An incident report sounds like the most logical choice here. The security consultant would need to document the details of the data breach in a comprehensive report.
Kati
Azalee
5 days agoMarvel
6 days agoKarrie
10 days agoRichelle
12 days ago