When forming a cybersecurity strategy, it is easy to become overwhelmed or have inherited something overly complex and simply ...