Computational Cybersecurity in Compromised Environments Workshop