The attacks are coming, and they are determined. So, we get all the right tools, and follow all the correct regulations and standards. We work with all the frameworks and abide by all the best practices. We put in place the latest software and hardware in an attempt to gain more visibility into our systems. Then it escalates, like an arms race, as both our networks, and our adversaries, become more complex. So we spend more money on more systems that generate more data.