In Part 3 of this webinar series, we’ll examine the operational components of our incident management process, exploring everything from how and when incidents are declared to the automated playbooks we leverage in customer environments to isolate endpoints, ban binary hashes, and bring incidents toward resolution. In the end, we’ll show you how our incident management process and incident handling team brought our full CIRT to bear in preventing the effects of the wide-reaching Kaseya supply chain attack.