Watch this video on YouTube
How should an organization determine the order of response actions when facing a multi-vector cybersecurity incident?