To deal with the inevitability of a significant cyberattack and breach, security and risk pros are forging relationships with external breach notification and incident response (IR) firms. However, simply having a retainer in place is not enough. Only by providing visibility into your organizational processes, establishing clear lines of communication, and blending IR capabilities are you able to extract the most value from your IR retainer.