What helps an analyst thoroughly respond to the complexity of security threat events?