It’s 2:17 AM—your phone rings. A major healthcare provider’s patient portal has been compromised, potentially exposing thousands of medical records. While most of the city sleeps, the incident response team at your organisation springs into action, isolating affected systems, tracing …