This two-page document is ideal for the Security Analyst, Security Operation Center (SOC) Managers and CISO, and will explain the