We review the existing controls, technology and Personnel and built a prioritized suggestion to improve the defenses and recovery capabilities
From there we go straight to recruiting the best contractor for the desired task, supervise them and in the end ensure that the organization cyber security posture has improved according to plan