Review of how cybersecurity complexity has built up in layers of security controls and technologies to address the latest threats as Black Hat USA’s first virtual event approaches.