Over the past 18 months the need to adapt to large-scale remote working, coupled with increased reliance on BYOD, and other challenges to the traditional ways of doing business, forced organizations to accelerate their digital transformation (DX) journeys. On the whole, this rapid evolution is widely being hailed as successful. On the downside, each new technology and step in the transformation journey has the potential to multiply the attack surface and expose more assets to the internet. Another challenge is that much of digital transformation is shadow IT, occurring outside of IT’s view or control. Partly as a consequence of accelerated DX, we have seen major cyberattacks and breaches proliferate in the last year as the threat surface rapidly expanded.