Organization and training of a cyber security team | IEEE Conference Publication | IEEE Xplore