Key Tactics and Techniques to Hack to Defend