The Cybersecurity Maturity Journey Explained