Step 1. Revisiting risks and vulnerability