What happens when cybersecurity knowledge walks out the door