Connecting the Operational Dots

This task involves understanding and preparing a security response to the existing vulnerabilities, closing the gap between the adversary’s capabilities to attack the organization versus the organization’s capabilities to prevent and respond to such scenarios.