From reactive to proactive, monitor fraud, pursue illicit activity, and detect and deter threat actors.