The pager doesn’t care why production is burning. A compromised credential chain triggering mass file encryption demands the same midnight scramble as a misconfigured load balancer taking down the payment gateway. Yet most organizations still maintain separate playbooks, separate escalation trees, separate war rooms for “technical incidents” versus “security incidents” — as if attackers politely wait for the right team to clock in.
This artificial boundary is killing response times when every minute counts.