Watch this video on YouTube
Recently, a vital client database was exposed during a cyber attack on your organization. As the head of Information Security, what metric would best determine the efficacy of your incident response team post this breach?