Contain: stop forwarding chains, revoke tokens if applicable, preserve logs without tipping malicious actors.
Notify according to your playbook: privacy officer, counsel, cyber insurer, and sometimes individuals/regulators on strict timelines.
Post-incident, update policies based on root cause—not generic “more training” alone.