Watch this video on YouTube
As an Information Security Manager, you have recently witnessed multiple security incidents in quick succession. Which approach would be most beneficial to determine the root cause and prevent future recurrences?