In this session, participants will dissect security breach scenarios. From initial reports through actual events, learn what to do before, during, and after a real or perceived cyber security event. Who are the bad guys, what do they want, how do they get it, and how do we stop it?