Problem
Assume you are the Chief Information Security Officer of Twitter and that, on Wednesday July 15, 2020, you received a report from IT support staff of suspicious calls that were received by Twitter employees, resulting in a suspected security incident at Twitter. After reading Twitter's press releases concerning the real-life incident, apply the Federal Trade Commission's Data Breach Response Guide for business in describing the policies and procedures that you would follow to address the security incident. Then, analyze Twitter's press release in light of the FTC's Breach Response Guide. Did Twitter follow the FTC's recommendations?