“Once you have these existing plans or these precedents, if you will, you can inherit those capabilities into all your downstream security plans,” Stephens said. “So, it’s kind of an amplification ...