This report is distributed to [list of recipients, e.g., IT management, security team, relevant stakeholders].