by Gregor Wegberg
With so many various forms of IT incidents around, it is essential to know the right people and partners and to be able to contact them promptly when the first IT systems do not behave as expected. We regularly experience the positive impact that a simple contact list of key persons and partners which has been prepared in advance has on the course of information security incidents.