How to Apply Risk Mitigation Strategies for Threat Reduction