The method
Define IT infrastructure, threat landscape, security controls, and compliance requirements. Ask for vulnerability assessments, security policies, or incident response plans.
The prompts
Prompt
Define IT infrastructure, threat landscape, security controls, and compliance requirements. Ask for vulnerability assessments, security policies, or incident response plans.