How Do We Move to A Production-Centric Cybersecurity Model?