How to Get the Most out of Your Security Monitoring with the Cyber Kill Chain Model