Presentation: What Should I Do to Harden my PI System Against Cyber Threats?