The request for information could be a good option, as the consultant might need to gather more details from the client to fully understand the scope of the breach.
I'm not sure about the application scan results. That seems more like something an internal IT team would conduct rather than a security consultant investigating a breach.
An incident report sounds like the most logical choice here. The security consultant would need to document the details of the data breach in a comprehensive report.
Erasmo
5 days agoKati
9 days agoAzalee
14 days agoMarvel
15 days agoFletcher
2 days agoKarrie
19 days agoRichelle
21 days ago