The document discusses information protection challenges in today's changing mobile and cloud environments. It outlines a new defense in depth approach with five key capabilities: reconnaissance, incursion, discovery, capture, and exfiltration. This model focuses on infrastructure-independent and adversary-centered security controls. It also recommends organizations shift to a risk, information, and people-centric approach to drive success in the new threat landscape.