How to implement a new cyber solution to change the defense status