Summarize the events that lead to the discovery of the potential vulnerability. Record your summary in the attached CON Reporting Template.

INTRODUCTION
Throughout your career in cybersecurity management, you will be asked to manage and protect your company IT department to support the company strategic goals and mission. Computer security incident response is an important component of IT programs. Performing an incident response is a complex undertaking. Establishing the capability to respond successfully to an incident requires substantial planning and resources.