11 (0:59) Detect, Mitigate, Prevent Data Exfiltration Through Breach Preparation “Assume the breach will happen and build your program to address it. How quickly can you detect and mitigate it? How do you prevent data from leaving your environment? If you answer those, you can back calculate, going reverse and design your security program based on that.”
