Creating a Computer Security Incident Response Team: Who Should Attend