The following case study is based on an actual cyber attack that occurred against a retailer. The case study describes what happened, the impact of the attack, the cyber resiliency techniques and the benefits of applying the techniques for various attack vectors.