Cybersecurity has traditionally been reactive. Detect a threat inside the network? Deploy an effective countermeasure. Get locked out of an application and receive a ransomware demand? Work to regain control over your systems. This never ending back and forth has put security teams on the defensive, always reacting to incidents, events and security risks as they present themselves.