Figure 9 Confidence in Ability to Handle and Mitigate a Cyber Attack