$ 0 0 In Part I of this series, we walked through the process of setting up a Cybersecurity Lakehouse that allowed us to collect and...