Most organizations will start with a shell of an IRP and then start filling in the operational details. Typically, this effort begins with a security incident where the response goes horribly wrong. In this Advisor, we describe some of the task areas that add the most value to an organization.
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.
Member/Guest loginForgot your password?