Strategy How to identify internal factors for a tailored cyber security strategy byMarcin Lisiecki2023-07-12