Cybersecurity implementation examples and Utility perspective on the cyber security: Session 2