The governance gap is massive. The speed of the exploit (sub-millisecond) is now the primary risk vector, making traditional policy enforcement obsolete. The Layered Governance Architecture (LGA) concept from the search results seems like the right direction—you need multiple, independent checks running at different speeds.