Discuss how post incident improvements and tasks associated to people, processes, and technologies can prevent “incident recidivism” from occuring. Consider things like table top excercises and other strategies or training methods, e.g., cyber ranges.