Much of our technology infrastructure is indefensible, requiring us to continuously rely on eroding countermeasures that attackers routinely evade. Learn about the methodology that CISA is using to chart a path toward defensible infrastructure and how to use this methodology to formulate technology strategy that will defend today and secure tomorrow.