A hacker's menus can access 10k accounts and your data. Will you pay the bill? Despite knowing that hackers are soft target driven, many organizations struggle to communicate that "Feeding Hackers' Appetite" is a risk-enabling concept. This speaking session explains why hackers' target exploitation is the weakest link, gateways additional risks, and survives when the cybersecurity shield becomes defeated.