Computer Security Controls

Do you currently use any computer security controls? If so, what? Against what threats are you trying to protect?

Various cyber security exercises have been performed throughout the world. Describe the limitations of such analyses.