This talk reviews recent web3 attacks, draws parallels to web2 security, and then outlines a comprehensive security strategy that spans from pre deployment steps (eg, auditing) to post deployment steps (monitoring and incident response). The talk provides an overview of these topics and highlights future research opportunities.