How do you secure a constantly changing IT landscape?