.................................................................................................................................. 3 Evolving Threats .................................................................................................................... 4 Easy Prey ............................................................................................................................. 4 Origin of Vulnerabilities .................................................................................................. 5 Cybercriminals Do Not Need 0-day Vulnerabilities ............................................... 6 Limitations of Traditional Defences............................................................................. 6 Protecting a Moving Target ................................................................................................ 8 Comparing Patching Strategies ..................................................................................... 9 Patch Availability ............................................................................................................. 12 Risk of Testing vs. Risk of Patching ............................................................................ 13 Cost of a Failed Patch.................................................................................................... 13 Compliance, Security, and Business Risks .................................................................... 15 Conclusion ............................................................................................................................ 16