We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.
The number of internet-connected devices is increasing exponentially and faster than anyone can manage or secure them.