Step 6: Monitor the Global Threat Environment Dashboard