10

Strategy Implementation

In the previous chapter, I discussed numerous cybersecurity strategies. In this chapter, I’ll take one of those strategies and illustrate how it can be implemented in a real IT environment. The objective is to take the theoretical and make it a little more real for you. I’ll provide some tips and tricks I’ve learned in my career along the way.

In this chapter we will cover the following:

  • What is the Intrusion Kill Chain?
  • Some ways that the traditional Kill Chain model can be modernized
  • Factors to consider when planning and implementing this model
  • Designing security control sets to support this model

Since the MITRE ATT&CK® framework is also popular, very useful, and complementary to the Intrusion Kill Chain, I’ll ...

Get Cybersecurity Threats, Malware Trends, and Strategies - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.