quote from Jan-Feb 2020 edition of (ISC)2’s InfoSecurity magazine