Perspectives on how people, processes, and technology come together for effective threat mitigation, by a recovering cybersecurity industry analyst.