Security experts urge cyber leaders to evolve their operations from reactive monitoring to autonomous, real-time protection.