John, the cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business? The attackers have successfully broken into your systems, and everyone is trying not to panic. Do you know who to call? Do you know what to do? Do you know what you do after that? Do you have an incident readiness and response playbook outlining how to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time?