The document discusses applying John Boyd's OODA (Observation, Orientation, Decision, Action) loop strategy to IT security decision making. It suggests that IT security currently lacks offensive capabilities and must function like prey, focusing on raising costs for adversaries through rapid change and diversity. This can be achieved through techniques like synthetic provisioning to introduce continuous change at the server level and maintain a "knowledge margin" over adversaries. Maintaining a high rate of change can prevent adversaries from developing effective tactics.