6 steps to validate cyber incident response plans in times of conflict | AWANI International