
Planning for Interactive Threats: Part 2 of 2
In Part I of this series, we covered what constitutes an interactive threat. Now that you have a handle on what an interactive threat is, how can you use this information to help you plan for them in your Integrity Management Plan (IMP)? When identifying