The relationship between blackhat hackers and network defenders is adversarial and the attacker has the advantage. Although both sides have access to different tools and information, their skill sets and training often overlap. This book discusses the attacker’s advantages, how defenders can level the playing field by adopting and modifying the characteristics of their attackers, and how an organization can optimize its management structure to best support security objectives. Multiple real-world case studies and examples highlight key points from the text. The effective and proven measures outlined in this book helps reduce that risk substantially.