From Planning to Execution: How to Ensure Seamless Event Security Operations