The Cyber Kill Chain is the high-level framework or workflow that threat actors employ in their efforts to compromise a target.
Actors behind threats have a toolbox of exploit techniques at their disposal. They often combine several intrusion tools and techniques in order to compromise and maintain access to their target. The key to disrupting is breaking the Cyber Kill Chain.
The Cyber Kill Chain is the high-level workflow that threat actors employ in their efforts to compromise the target.
This document gives you a snapshot of the current state of cybersecurity breaches, an in depth look at the stages of the Kill Chain, and the key questions you must address in each part of the Kill Chain to successfully stop the adversary.
What you will learn:
- Stages of the Kill Chain
- How an adversary progresses through the Kill Chain
- Key information security questions you must address
- Key solutions that can help your organization address gaps in capabilities