A cybersecurity strategy based on the assumption that an organization is already breached or will be breached.