First steps

Security transformation begins with methodical self-reflection.