• Identifying critical decisions to be made during a cyber incident
  • Evaluating business impact and potential compromises
  • Balancing risk mitigation with business continuity