In this session, we will be going over what the Top Threats survey report is, how it can be used to identify misconfigurations in your own environment, and placing controls to develop stronger coverage. We will also briefly be touching on the newest survey report results, which will be accompanied in the new Top Threats release later next month.