This represents the amount of time that an attacker has access to an environment from the initial time they get in to when they are detected.
Cyber Essentials Scheme Cyber Resilience Cyber Risk Firewall & Network Security Industry & Updates Phishing & Security Awareness Training Technical Vulnerability Management