Watch this video on YouTube
At which point during the incident response process are new security controls implemented?