Next Steps in Playbook Driven Cyber Security