. following a serious data breach affecting a supplier company, your ceo wants assurance that your company is not exposed to the same risk. the supplier is willing to share threat data gathered about the breach with you. you advise a threat hunting program as the most appropriate tool to use. what should be the first step in this process