thumbnail Deconstructing a Cybersecurity Event