Blueprint: Build the Best in Cyber Defense cover image

Strategy 5: Prioritize Incident Response

Blueprint: Build the Best in Cyber Defense

00:00

How to Scale a Service Organization

In the book, you had an example list of like, here's all the types of terrible things that might happen and kind of how severe they are. We've pulled up our feed info code against350 Lite and managed to break the net into far happens. So maybe a root compromise would be bad on the intellectual property where it's all exfiltrated. You really want to think about ahead of time.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app