Every security team has its own set of security tools, competencies, common use cases and compliance requirements. One of the few common threads that weaves through all these elements is the steps for responding to a security incident. This sponsored study of security professionals around the world delves into their challenges across the incident response (IR) lifecycle, the tools they use and the capabilities they feel are missing from their tool stacks.