The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needsJeremy Thompson