Define and achieve effective cyber defenses
Detailed threat models of cyber attacks and the attackers behind them abound. We are all familiar with the outcomes of a successful attack. Isn't it time someone defined what effective defenses look like? Trellix has already designed an approach you can use.