John, more and more, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. What does attack surface management look like and how do you predict what an attacker will focus on? How do you identify the security holes that will be attractive for the attacker so that you can plug them first? How can you use deception tools and strategies to trick adversaries into thinking they’ve succeeded?