Identity Risk: Best Practices for Uncovering Hybrid Attack Paths