Peer to Peer: ILTA's Quarterly Magazine
Issue link: https://epubs.iltanet.org/i/1533864
36 P icture a high- stakes game of chess where every move could mean the difference between the effectiveness of your organization's cybersecurity system and a breach. Do you have the right products and services to secure your network? Do you have defenses that can counter real-world, not hypothetical, adversaries? Organizations are securing their network with products and services designed to help them achieve their goals. But do you have an unidentified single point of failure? Are you allocating your limited budgets wisely? These are some of the questions that most firms wrestle with. Fortunately, anyone can use a straightforward process to perform a brief audit or review of their game plan (hours, not days) to get answers to the questions. This review utilizes a framework called the Cyber Kill Chain. The Cyber Kill Chain is a cybersecurity model developed by Lockheed Martin. It outlines various ways organizations can trace the stages of an attack and avoid future cyber threats. Organizations can use the Cyber Kill Chain to plan strategies for preventing and detecting malicious intruders. Through knowledge of the various stages of common cyberattacks, organizational defenders enhance their understanding of adversary tactics, techniques, and procedures (TTPs). CYBER KILL CHAIN STAGES Green: What threat actors do to prepare for an attack. Yellow to Red: Actions threat actors take to achieve their goals and objectives. Looking at the graphic, the threat actor (TA) begins their attack on the left side of the chain and moves to the right as they progress through DIY SECURITY IMPROVEMENTS WITH CYBER KILL CHAIN by Mark Brophy Are you allocating your limited budgets wisely? FEATURES