Chapter 3: Assessing and Managing Cybersecurity Risk