An organization with a large computer network identified a potential cyber security threat. Although certain measures were implemented to avoid the risk, the cyber security threat occurs. The measures were partially successful and a new unforeseen risk emerges.
What should the risk owner do?
Submit