You have been tasked with writing security incident response procedures for your organization. Write a high-level outline or checklist for the following scenario: An external hacker has compromised your systems and has made extortion threats.
Avoid presenting a very general procedure that can be applied to any scenario. Justify why your answer responds to the specific scenario mentioned above.