This document summarizes the key points from a presentation on offensive security and defining mitigations. The presentation outlines three main points: 1) New vulnerability mitigations should fully address at least three past vulnerabilities to be seriously considered. 2) Those proposing mitigations must understand exploits, which requires experience writing exploits or collaborating with someone who has that experience. 3) Defensive investments should be guided by offensive investments, as implementation details are critical for effective mitigations rather than just architectural definitions. The document also discusses trends toward formalizing offensive techniques and their importance for advancing the field.