Cyber Resilience: Part 3 - Protect