WORKSHOP 2 – Behind the Breach: A KEY to Enabling a Breach