Managing the Consequences of Cyber Threats