Loading: 5 Steps to Becoming Secure by Design in the Face of Evolving Cyber Threats