An incident response team has determined there is a need to isolate a system that is communicating with a known malicious host on the Internet. Which of the following stakeholders should be contacted FIRST?
A. Key customers
B. Executive management
C. System administrator
D. The business owner