/
사이버 레질리언스

Welcome to the Post-Breach Era. Is Your Cyber Strategy Ready?

The enemy of a good plan? Perfection.

That’s the mindset Andrew Rubin, Illumio CEO and founder, brought to his conversation with Dark Reading’s Terry Sweeney.  

He didn’t talk about how to build the perfect defense — because it doesn’t exist. Instead, he focused on something far more powerful: how to build a strategy that works when things go wrong. Because they will go wrong.

We’re living in a post-breach world. And it’s the new baseline cybersecurity leadership must aim for in today’s threat landscape.

Watch Andrew’s full interview here:

The post-breach world is already here

Saying that we live in a post-breach world isn’t being alarmist. It’s just reality.

As Andrew put it, “The defenders are trying to be right 100% of the time. The attacker only has to be right once.”  

And with attacks growing in scale, speed, and scope — from hospitals to school districts to business big and small — the math just doesn’t work anymore.

The defenders are trying to be right 100% of the time. The attacker only has to be right once.

The idea of a post-breach world is about accepting that reality. We shouldn't give up, but we can acknowledge that even the best defenses can fail.

In Andrew’s words, “If you don’t admit the problem, you can’t possibly figure out how to solve it.” Accepting that breaches are inevitable isn’t waving the white flag. It’s step one toward resilience.

Why cyber agility is still playing catch-up

It’s easy to see attackers as more agile, and in many ways, they are. They innovate faster, move quicker, and face fewer roadblocks.  

Meanwhile, defenders often get bogged down in bureaucracy, legacy tech, or resource gaps.

But Andrew remains an optimist. “It’s hard to do this job and not be optimistic,” he said.  

He believes defenders are catching up. The mindset is shifting. Breaches like the ones we’ve seen in just the past year have been a wake-up call, pushing security teams to move faster, think differently, and prioritize agility.

If defenders want to stay relevant, let alone stay secure, they need to keep pace. That means adopting tools, strategies, and architectures that are built for speed and resilience, not just perimeter control.

Your security strategy needs a security graph

As attacks become more complex, so must our defenses. That’s where the security graph comes in.

According to Andrew, the future of cybersecurity depends on our ability to see and understand our environments as connected systems, not isolated assets. A security graph maps the relationships between users, devices, workloads, policies, and flows. It reveals how risk moves, how attackers might navigate, and what shouldn't be connected but is.

It's a concept embraced by more than just Illumio. Microsoft, Google, and others are investing in security graphs too. Why? Because you can’t secure what you don’t understand.

And with that map in place, you can start to ask the right questions:

  • Why is this connection happening?
  • Should it be happening?
  • What happens if it’s compromised?

The role of AI in the post-breach fight

Of course, you can’t talk about cybersecurity in 2025 without talking about AI.  

Andrew was clear: AI is just a tool. It’s not inherently good or bad. But the side that uses it better will have the upper hand. And for defenders, the opportunity is huge.

“Being able to use AI to comb that graph, to understand and find things that the human brain can’t process fast enough, is an incredibly powerful tool,” he said.

At Illumio, we’re already applying AI to the security graph with Illumio Insights. It helps teams spot threats faster, contain them earlier, and minimize damage.  

A screenshot of Illumio Insights on a laptop screen

According to Andrew, AI shouldn't replace human judgment, especially in your security operations. It should augment it, helping teams find the signal in an ever-growing haystack of noise.

Zero Trust was made for this moment

Zero Trust isn’t new. In fact, as Andrew reminded us, Illumio Chief Evangelist John Kindervag coined the term more than 15 years ago.

But if Zero Trust ever felt optional before, it’s now a non-negotiable.

Because in a post-breach world, the foundational Zero Trust question —Should this connection be happening?” — is the difference between catching an attacker early and letting them roam undetected.

Too often, security teams allow traffic and access by default, then try to monitor everything in hopes of catching bad behavior. That’s backward.  

Instead, Zero Trust denies connections by default. Then allows only what’s explicitly needed.

As Andrew put it, “We’re recognizing that there are a lot of things happening in our environments that shouldn’t be or don’t need to be. Why are we allowing that to continue?”

Stop chasing perfection and start building resilience

Surviving in the post-breach world isn’t about giving up on prevention or detection. But it is about expanding our toolkit.

If we keep operating like we can block every breach, we’ll keep getting blindsided. If we build for containment and recovery by investing in segmentation, visibility, and Zero Trust controls, we can stop small intrusions from becoming catastrophic.

Andrew said it best: “Nobody says give up on defense. What we say is that’s one set of tools. Now we need another set of tools to contain these things, stop them faster, and prevent them from becoming disasters.”

The world has changed. Our strategies need to change with it.

Nobody says give up on defense. What we say is that’s one set of tools. Now we need another set of tools to contain these things, stop them faster, and prevent them from becoming disasters.

You don’t need a perfect plan. You need a good one that works, even when something goes wrong. Because something will go wrong.

We’re living in the post-breach world. Let’s stop pretending otherwise and start building the kind of cybersecurity that’s designed to thrive in it.

Want to see what an AI security graph can do for your security operation? Test drive Illumio Insights today.

관련 주제

관련 기사

사이버 레질리언스 구축?MITRE ATT&CK 프레임워크를 북극으로 활용하세요
사이버 레질리언스

사이버 레질리언스 구축?MITRE ATT&CK 프레임워크를 북극으로 활용하세요

블루팀 전문가인 닉 카스텐센으로부터 MITRE ATT&CK 프레임워크가 조직의 사이버 레질리언스 구축을 이끄는 데 어떻게 도움이 될 수 있는지 알아보세요.

데이터센터 및 클라우드 보안 — 혁명이 필요한 이유
사이버 레질리언스

데이터센터 및 클라우드 보안 — 혁명이 필요한 이유

혁명이 일어나는 데에는 그럴만한 이유가 있습니다.이는 기대와 현실의 차이로 인해 억눌린 좌절감이 뒤따르면서 변화의 필요성이 대두되는 결과입니다.기존 방식은 더 이상 새로운 요구 사항에 부합하지 않으며 이러한 변화 외에는 다른 옵션이 없는 끓는점에 이르게 됩니다.

새로운 TCP 포트 135 보안 취약점을 방지하는 방법
사이버 레질리언스

새로운 TCP 포트 135 보안 취약점을 방지하는 방법

TCP 포트 135를 악용하여 원격 명령을 실행하는 방법으로 포트 445 취약점이 발생하여 TCP 보안을 보장하기 위해 포트 135를 보호해야 했습니다.

AI 기반 클라우드 옵저버빌리티: CPO 마리오 에스피노자와 함께 일루미오 인사이트 심층 분석
일루미오 제품

AI 기반 클라우드 옵저버빌리티: CPO 마리오 에스피노자와 함께 일루미오 인사이트 심층 분석

Illumio Insights가 AI 기반 클라우드 옵저버빌리티를 사용하여 사이버 위협을 실시간으로 탐지하고 억제하는 방법을 알아보세요.

존 킨더백이 말하는 제로 트러스트에 대해 보안 리더들이 여전히 놓치고 있는 점
제로 트러스트 세그멘테이션

존 킨더백이 말하는 제로 트러스트에 대해 보안 리더들이 여전히 놓치고 있는 점

제로 트러스트 개발자인 John Kindervag와 함께 하는 이 심층 분석을 통해 사이버 보안 리더들이 제로 트러스트에 대해 여전히 잘못 이해하고 있는 점을 알아보세요.

멀티클라우드 환경에서 보안 침해를 억제하고 통제력을 회복하는 방법
일루미오 제품

멀티클라우드 환경에서 보안 침해를 억제하고 통제력을 회복하는 방법

Illumio가 클라우드 플랫폼 전반에 걸쳐 가시성과 보안 침해 억제를 제공하여 측면 이동을 막고 하이브리드, 멀티 클라우드 환경을 보호하는 방법을 알아보십시오.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?