Following a cyber attack on critical infrastructure, emotions run high and the clock starts ticking. Suddenly what appears to be a well-structured incident response plan on paper can turn into a confusing "storming session" around who owns what. Rather than identifying, analyzing and eradicating the threat, organizations can easily become entangled in processes hindering response…
Read MoreSource: TechCrunch