Get the most out of the technology or platforms.
ISIO endorses the research methodologies for technologies and software related to security management, incident management, emergency management, risk assessment, investigation management, oversight and governance management and such like.
When cognitive input is required then these technologies is only as good as the users because of their critical thinking method.
Plain and simple!
Consequently, the approved technology providers have included the easiest and most effective method (cognitive development tool)along with a consistent flow of specific related intelligence) to uncover crime, discover damning issues and opportunities (methods to litigate or limit the level of collateral damage).