Identity and Access Management for Government Agencies

Your network has been compromised. Is it time to reevaluate your traditional cyber security paradigms?