Anatomy of a Cyber Security Breach: The Hero’s Journey