Watch this video on YouTube
After a breach has been successfully contained, what is the most critical step before transitioning to the recovery phase?