This document provides an overview of cyber security topics including the evolution of cyber attacks from individual hackers to sophisticated nation-state attacks. It discusses the changing motives for attacks which now include disruption for political purposes. Common attack vectors target critical infrastructure, governments, and enterprises. The document recommends a defense in depth approach for enterprises that includes next-generation firewalls, intrusion detection, access management, patching, and antivirus.