The need for a high degree of interconnectivity poses many challenges to organizations to adequately protect and defend their infrastructure from sophisticated cyber-attacks. External and internal attackers have caused substantial losses to organizations, not only in exposing embarrassing emails and incurring financial costs, but to the reputations that never recover. Hackers employ a variety of techniques and strategies to steal financial data, intellectual property, and expose sensitive information. They range from individual attackers, to activist groups, to teams of well-funded criminal enterprises, to full-time attackers employed on behalf of nation-states. If an organization does not have an IT cybersecurity program and security controls in place to handle threats, they will pay the price in costly data breaches and inevitable legal issues.