An information security manager has determined that the mean time to prioritize information security incidents has increased to an unacceptable level. Which of the following processes would BEST enable the information security manager to address this concern?
A. Incident classification
B. Vulnerability assessment
C. Incident response
D. Forensic analysis
A. Incident classification
B. Vulnerability assessment
C. Incident response
D. Forensic analysis