Because security operation involves a wide range of work, each different field uses a different set of working tools. Daily operations are performed using these tools in a sequential manner.
I would like to introduce some useful tools and present the example of how they are actually being used.
I would also like to exchange information about whether there are better tools and processes that we could be utilizing.