In order to be able to relate the lessons learned generated from information security incidents, we consider including this field.
·