Nation state teams pose significant cyber threats through techniques like advanced persistent threats (APTs) and supply chain compromises. The document discusses nation state teams like China's APT1, which have successfully breached many organizations. It recommends developing an adaptive cyber security strategy using principles from military strategy. This includes gaining threat intelligence from various sources to stay updated on threats. Both traditional "defense in depth" and more agile "overlapping fields of defense" approaches are suggested. The document provides an overview of steps to improve security like assessing risks and developing security policies, and recommends specific controls and technologies to implement like secure email gateways, endpoint protection, and network activity monitoring.