With all the security breaches in the news today, it’s astounding that the natural tendency for IT and security teams is to continue to be reactionary. Upon confirmation of a cyber-related event, security teams work diligently to ‘stop the bleeding’ before conducting forensics to determine the attack signature and attack vector, which might ultimately shed light on how the attack was perpetrated. Then, either out of genuine remorse towards its customers; a moment of humility, or Board appeasement, security policies, and procedures are either reaffirmed, updated or changed entirely. ThatSEE DETAILS