In our work with customers, we often see that organizations work on their information and cybersecurity in a checklist format. Do I have all the things in place that I’ve been told I’m supposed to? Firewall? Check. SIEM? Check. Encryption? Check. Strong passwords? Check — and the list goes on and on in this very…