You are on the 13th tee of your Saturday morning golf game. This game and the rest of your foursome are just the distractions you need from your job as CFO of a rapidly growing electronic parts distribution company. When you glance at your silenced smartphone, however, you notice a string of missed calls from your chief technology officer. You step back from the tee to listen to several messages, including a nearly hysterical one from your CEO, ranting about the company website, servers, unscrupulous hackers, and other indecipherable topics. The gist is that the company website and servers have been hacked and several types of sensitive information may have been accessed, including customer information and possibly even company trade secrets.
So what do you do next?