The WEF's Cyber Attack Simulation_ Part 2