/
Cyber Resilience

Welcome to the Post-Breach Era. Is Your Cyber Strategy Ready?

The enemy of a good plan? Perfection.

That’s the mindset Andrew Rubin, Illumio CEO and founder, brought to his conversation with Dark Reading’s Terry Sweeney.  

He didn’t talk about how to build the perfect defense — because it doesn’t exist. Instead, he focused on something far more powerful: how to build a strategy that works when things go wrong. Because they will go wrong.

We’re living in a post-breach world. And it’s the new baseline cybersecurity leadership must aim for in today’s threat landscape.

Watch Andrew’s full interview here:

The post-breach world is already here

Saying that we live in a post-breach world isn’t being alarmist. It’s just reality.

As Andrew put it, “The defenders are trying to be right 100% of the time. The attacker only has to be right once.”  

And with attacks growing in scale, speed, and scope — from hospitals to school districts to business big and small — the math just doesn’t work anymore.

The defenders are trying to be right 100% of the time. The attacker only has to be right once.

The idea of a post-breach world is about accepting that reality. We shouldn't give up, but we can acknowledge that even the best defenses can fail.

In Andrew’s words, “If you don’t admit the problem, you can’t possibly figure out how to solve it.” Accepting that breaches are inevitable isn’t waving the white flag. It’s step one toward resilience.

Why cyber agility is still playing catch-up

It’s easy to see attackers as more agile, and in many ways, they are. They innovate faster, move quicker, and face fewer roadblocks.  

Meanwhile, defenders often get bogged down in bureaucracy, legacy tech, or resource gaps.

But Andrew remains an optimist. “It’s hard to do this job and not be optimistic,” he said.  

He believes defenders are catching up. The mindset is shifting. Breaches like the ones we’ve seen in just the past year have been a wake-up call, pushing security teams to move faster, think differently, and prioritize agility.

If defenders want to stay relevant, let alone stay secure, they need to keep pace. That means adopting tools, strategies, and architectures that are built for speed and resilience, not just perimeter control.

Your security strategy needs a security graph

As attacks become more complex, so must our defenses. That’s where the security graph comes in.

According to Andrew, the future of cybersecurity depends on our ability to see and understand our environments as connected systems, not isolated assets. A security graph maps the relationships between users, devices, workloads, policies, and flows. It reveals how risk moves, how attackers might navigate, and what shouldn't be connected but is.

It's a concept embraced by more than just Illumio. Microsoft, Google, and others are investing in security graphs too. Why? Because you can’t secure what you don’t understand.

And with that map in place, you can start to ask the right questions:

  • Why is this connection happening?
  • Should it be happening?
  • What happens if it’s compromised?

The role of AI in the post-breach fight

Of course, you can’t talk about cybersecurity in 2025 without talking about AI.  

Andrew was clear: AI is just a tool. It’s not inherently good or bad. But the side that uses it better will have the upper hand. And for defenders, the opportunity is huge.

“Being able to use AI to comb that graph, to understand and find things that the human brain can’t process fast enough, is an incredibly powerful tool,” he said.

At Illumio, we’re already applying AI to the security graph with Illumio Insights. It helps teams spot threats faster, contain them earlier, and minimize damage.  

A screenshot of Illumio Insights on a laptop screen

According to Andrew, AI shouldn't replace human judgment, especially in your security operations. It should augment it, helping teams find the signal in an ever-growing haystack of noise.

Zero Trust was made for this moment

Zero Trust isn’t new. In fact, as Andrew reminded us, Illumio Chief Evangelist John Kindervag coined the term more than 15 years ago.

But if Zero Trust ever felt optional before, it’s now a non-negotiable.

Because in a post-breach world, the foundational Zero Trust question —Should this connection be happening?” — is the difference between catching an attacker early and letting them roam undetected.

Too often, security teams allow traffic and access by default, then try to monitor everything in hopes of catching bad behavior. That’s backward.  

Instead, Zero Trust denies connections by default. Then allows only what’s explicitly needed.

As Andrew put it, “We’re recognizing that there are a lot of things happening in our environments that shouldn’t be or don’t need to be. Why are we allowing that to continue?”

Stop chasing perfection and start building resilience

Surviving in the post-breach world isn’t about giving up on prevention or detection. But it is about expanding our toolkit.

If we keep operating like we can block every breach, we’ll keep getting blindsided. If we build for containment and recovery by investing in segmentation, visibility, and Zero Trust controls, we can stop small intrusions from becoming catastrophic.

Andrew said it best: “Nobody says give up on defense. What we say is that’s one set of tools. Now we need another set of tools to contain these things, stop them faster, and prevent them from becoming disasters.”

The world has changed. Our strategies need to change with it.

Nobody says give up on defense. What we say is that’s one set of tools. Now we need another set of tools to contain these things, stop them faster, and prevent them from becoming disasters.

You don’t need a perfect plan. You need a good one that works, even when something goes wrong. Because something will go wrong.

We’re living in the post-breach world. Let’s stop pretending otherwise and start building the kind of cybersecurity that’s designed to thrive in it.

Want to see what an AI security graph can do for your security operation? Test drive Illumio Insights today.

Related topics

Related articles

Why Cyber Disasters Are Still Happening — And How to Fix It
Cyber Resilience

Why Cyber Disasters Are Still Happening — And How to Fix It

Get insight from Gary Barlet, Illumio Federal CTO, on why decades of trying to prevent and detect direct attacks by adversaries – and failing – means it's time to shift the focus to containment.

The 4 Mindset Shifts Required to Secure the Cloud
Cyber Resilience

The 4 Mindset Shifts Required to Secure the Cloud

Read the four key mindset shifts that organizations must make when securing the cloud.

Get 5 Zero Trust Insights from Microsoft’s Ann Johnson
Cyber Resilience

Get 5 Zero Trust Insights from Microsoft’s Ann Johnson

Hear from Ann Johnson, Corporate VP of Microsoft Security Business Development, on cyber resilience, AI, and where to start with Zero Trust.

AI-Powered Cloud Observability: A Deeper Look at Illumio Insights with CPO Mario Espinoza
Illumio Products

AI-Powered Cloud Observability: A Deeper Look at Illumio Insights with CPO Mario Espinoza

Discover how Illumio Insights uses AI-powered cloud observability to detect and contain cyber threats in real time.

John Kindervag on What Security Leaders Are Still Missing About Zero Trust
Zero Trust Segmentation

John Kindervag on What Security Leaders Are Still Missing About Zero Trust

Discover what cybersecurity leaders are still getting wrong about Zero Trust in this deep dive with Zero Trust creator John Kindervag.

How to Contain Breaches and Regain Control in Your Multi-Cloud Environment
Illumio Products

How to Contain Breaches and Regain Control in Your Multi-Cloud Environment

Learn how Illumio delivers visibility and breach containment across cloud platforms, helping you stop lateral movement and secure hybrid, multi-cloud environments.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?