Many security ... breach relies on robust monitoring and forensic capabilities. And when security operations are outsourced — as they increasingly are — lack of familiarity with the business ...