AbstractIntroductionThe Difference Between Containment and RecoveryRecovering Your EnvironmentCertifying Your EnvironmentRestoring Business ServicesConducting a Breach Postmortem ReviewImproving Cyber Security After a BreachCreating a Cyber Defensible PositionSummary