The organization must have established protocols for responding to InfoSec incidents, which include containing, collecting evidence, escalating, logging, communicating, coordinating, closing, analyzing, and managing vulnerabilities. Designated employees or teams should respond to these incidents and should have the needed competencies.