Within the information security community it is almost universally agreed that the adversary has the edge when they attack our networks. This premise stems from The idea that the attacker only needs to succeed once in order to get access to an organization’s sensitive information while the defender must succeed every time.