The document discusses the increasing complexity of modern IT environments and how this has impacted security. It notes that even the NSA director believes adversaries will inevitably breach networks, so systems must be built with this assumption. The rise of mobility, BYOD, and cloud computing is extending data movement and attack surfaces. Effective security requires an integrated approach including anti-malware, systems management, data encryption, and mobile device management to reduce risks in this complex IT landscape.