GUEST OPINION: We've all seen this movie or TV scene: A hacker sits in a shadowy room busily typing on his keyboard. The camera slowly pans around him and within a few clicks – voilà! – the protagonist has deployed a cyber attack into the highly secured target he was trying to penetrate. 'I'm in', he says.