How can computer engineers educate decision makers on the results of enterprise risk management after performing an analysis on a system that was suppose to be hack-proof and was very expensive to implement?

1 What limitations might an analyst encounter through the use of efficient analysis on a Military Operation who has had a history of hacking and unauthorized penetration? How can computer engineers educate decision makers on the results of enterprise  risk management after performing  an analysis on a system that was suppose to be hack-proof  and  was very expensive to implement?