/
Cyber-résilience

Welcome to the Post-Breach Era. Is Your Cyber Strategy Ready?

The enemy of a good plan? Perfection.

That’s the mindset Andrew Rubin, Illumio CEO and founder, brought to his conversation with Dark Reading’s Terry Sweeney.  

He didn’t talk about how to build the perfect defense — because it doesn’t exist. Instead, he focused on something far more powerful: how to build a strategy that works when things go wrong. Because they will go wrong.

We’re living in a post-breach world. And it’s the new baseline cybersecurity leadership must aim for in today’s threat landscape.

Watch Andrew’s full interview here:

The post-breach world is already here

Saying that we live in a post-breach world isn’t being alarmist. It’s just reality.

As Andrew put it, “The defenders are trying to be right 100% of the time. The attacker only has to be right once.”  

And with attacks growing in scale, speed, and scope — from hospitals to school districts to business big and small — the math just doesn’t work anymore.

The defenders are trying to be right 100% of the time. The attacker only has to be right once.

The idea of a post-breach world is about accepting that reality. We shouldn't give up, but we can acknowledge that even the best defenses can fail.

In Andrew’s words, “If you don’t admit the problem, you can’t possibly figure out how to solve it.” Accepting that breaches are inevitable isn’t waving the white flag. It’s step one toward resilience.

Why cyber agility is still playing catch-up

It’s easy to see attackers as more agile, and in many ways, they are. They innovate faster, move quicker, and face fewer roadblocks.  

Meanwhile, defenders often get bogged down in bureaucracy, legacy tech, or resource gaps.

But Andrew remains an optimist. “It’s hard to do this job and not be optimistic,” he said.  

He believes defenders are catching up. The mindset is shifting. Breaches like the ones we’ve seen in just the past year have been a wake-up call, pushing security teams to move faster, think differently, and prioritize agility.

If defenders want to stay relevant, let alone stay secure, they need to keep pace. That means adopting tools, strategies, and architectures that are built for speed and resilience, not just perimeter control.

Your security strategy needs a security graph

As attacks become more complex, so must our defenses. That’s where the security graph comes in.

According to Andrew, the future of cybersecurity depends on our ability to see and understand our environments as connected systems, not isolated assets. A security graph maps the relationships between users, devices, workloads, policies, and flows. It reveals how risk moves, how attackers might navigate, and what shouldn't be connected but is.

It's a concept embraced by more than just Illumio. Microsoft, Google, and others are investing in security graphs too. Why? Because you can’t secure what you don’t understand.

And with that map in place, you can start to ask the right questions:

  • Why is this connection happening?
  • Should it be happening?
  • What happens if it’s compromised?

The role of AI in the post-breach fight

Of course, you can’t talk about cybersecurity in 2025 without talking about AI.  

Andrew was clear: AI is just a tool. It’s not inherently good or bad. But the side that uses it better will have the upper hand. And for defenders, the opportunity is huge.

“Being able to use AI to comb that graph, to understand and find things that the human brain can’t process fast enough, is an incredibly powerful tool,” he said.

At Illumio, we’re already applying AI to the security graph with Illumio Insights. It helps teams spot threats faster, contain them earlier, and minimize damage.  

A screenshot of Illumio Insights on a laptop screen

According to Andrew, AI shouldn't replace human judgment, especially in your security operations. It should augment it, helping teams find the signal in an ever-growing haystack of noise.

Zero Trust was made for this moment

Zero Trust isn’t new. In fact, as Andrew reminded us, Illumio Chief Evangelist John Kindervag coined the term more than 15 years ago.

But if Zero Trust ever felt optional before, it’s now a non-negotiable.

Because in a post-breach world, the foundational Zero Trust question —Should this connection be happening?” — is the difference between catching an attacker early and letting them roam undetected.

Too often, security teams allow traffic and access by default, then try to monitor everything in hopes of catching bad behavior. That’s backward.  

Instead, Zero Trust denies connections by default. Then allows only what’s explicitly needed.

As Andrew put it, “We’re recognizing that there are a lot of things happening in our environments that shouldn’t be or don’t need to be. Why are we allowing that to continue?”

Stop chasing perfection and start building resilience

Surviving in the post-breach world isn’t about giving up on prevention or detection. But it is about expanding our toolkit.

If we keep operating like we can block every breach, we’ll keep getting blindsided. If we build for containment and recovery by investing in segmentation, visibility, and Zero Trust controls, we can stop small intrusions from becoming catastrophic.

Andrew said it best: “Nobody says give up on defense. What we say is that’s one set of tools. Now we need another set of tools to contain these things, stop them faster, and prevent them from becoming disasters.”

The world has changed. Our strategies need to change with it.

Nobody says give up on defense. What we say is that’s one set of tools. Now we need another set of tools to contain these things, stop them faster, and prevent them from becoming disasters.

You don’t need a perfect plan. You need a good one that works, even when something goes wrong. Because something will go wrong.

We’re living in the post-breach world. Let’s stop pretending otherwise and start building the kind of cybersecurity that’s designed to thrive in it.

Want to see what an AI security graph can do for your security operation? Test drive Illumio Insights today.

Sujets connexes

Articles connexes

La cyberrésilience : la priorité absolue du secteur bancaire en matière de sécurité
Cyber-résilience

La cyberrésilience : la priorité absolue du secteur bancaire en matière de sécurité

Dans ce discours de décembre 2021, Bo Li, directeur général adjoint du Fonds monétaire international (FMI), a souligné la façon dont la technologie numérique imprègne tous les aspects de la société, augmentant notre dépendance à l'égard de l'interconnectivité et des réseaux qui la soutiennent.

Pourquoi la segmentation est importante aujourd'hui si vous voulez une cyberassurance
Cyber-résilience

Pourquoi la segmentation est importante aujourd'hui si vous voulez une cyberassurance

Découvrez pourquoi les compagnies d'assurance cybernétique exigent de plus en plus la segmentation Zero Trust pour leur couverture.

La fabrication intelligente rend-elle vos opérations vulnérables ?
Cyber-résilience

La fabrication intelligente rend-elle vos opérations vulnérables ?

Découvrez comment l'industrie 4.0 transforme la cybersécurité du secteur de la fabrication et pourquoi l'utilisation d'une approche Zero Trust peut contribuer à vous protéger contre les vulnérabilités des usines intelligentes et des circuits intégrés.

Observabilité du cloud alimentée par l'IA : examen approfondi d'Illumio Insights avec Mario Espinoza, CPO
Produits Illumio

Observabilité du cloud alimentée par l'IA : examen approfondi d'Illumio Insights avec Mario Espinoza, CPO

Découvrez comment Illumio Insights utilise l'observabilité du cloud alimentée par l'IA pour détecter et contenir les cybermenaces en temps réel.

John Kindervag explique ce que les responsables de la sécurité ignorent encore à propos de Zero Trust
Segmentation Zero Trust

John Kindervag explique ce que les responsables de la sécurité ignorent encore à propos de Zero Trust

Découvrez ce que les leaders de la cybersécurité se trompent encore à propos de Zero Trust dans cette étude approfondie avec John Kindervag, créateur de Zero Trust.

Comment contenir les brèches et reprendre le contrôle de votre environnement multicloud
Produits Illumio

Comment contenir les brèches et reprendre le contrôle de votre environnement multicloud

Découvrez comment Illumio assure la visibilité et limite les intrusions sur l'ensemble des plateformes cloud, en vous aidant à stopper les mouvements latéraux et à sécuriser les environnements hybrides et multicloud.

Assume Breach.
Minimisez l'impact.
Augmentez la résilience.

Vous souhaitez en savoir plus sur la segmentation Zero Trust ?