Increasingly, cyber space is being leveraged not just to steal information, but make a statement and sabotage operations. Responding to disruptive breaches is challenging and not easy to plan for given the dynamic nature of these attacks and the attackers.