A financial organization is assessing the methods used by cyber adversaries to gain unauthorized access to their systems. Which tactic within the MITRE ATT&CK framework BEST describes techniques adversaries might use to initially breach the organization's defenses?
Initial Access
Execution
Persistence
Command and Control