Scenario: You are part of the security team for ‘MedTech Solutions,’ a mid-sized healthcare technology provider. The company operates globally and manages sensitive patient health data. A recent internal audit identified