For years, cybersecurity strategies have focused on reacting to incidents responding after alerts are triggered, systems are compromised, or services…