Assume breach
Segmentation and hardware keys beat perimeter swagger when supply chains are global.
Human capital
Reserve cyber units need realistic drill data, not trophy dashboards for ministers.
Interoperability
NATO-style standards help allies share ISR without leaking partner tactics through chat apps.