Watch this video on YouTube
Upon detection of a security breach within your organization's digital infrastructure, what should be the predominant intent behind your incident containment strategies?