How can you respond to cyber threats that don’t exist?