Building a custom incidence response plan that will identify the attacker, scope of the incident, and contain the attack.