How many of you can accurately predict the attack vector used in the next major breach?
There are a lot to choose from right? An attempt to breach your organization may involve a well-crafted spear-phishing campaign with a malicious attachment or a link to a site hosting malicious content. It might be a drive-by on a prominent website your users frequent. It could be that flash drive shared with a friend and then inserted into your work computer. It could be a malicious object copied across one of the many network file shares in your organization. It could also be an intruder taking advantage of a vulnerability and using it to create a pathway into your organization.
The bottom line is, we can’t predict where or how the next breach will occur, and unless your cyber-security Kung Fu skills are like Bruce Lee’s at handling attacks from any source involving any number of unknown opponents, you’re going to need some help dealing with the problem.