10
Strategy Implementation
In the previous chapter, I discussed numerous cybersecurity strategies. In this chapter, I’ll take one of those strategies and illustrate how it can be implemented in a real IT environment. The objective is to take the theoretical and make it a little more real for you. I’ll provide some tips and tricks I’ve learned in my career along the way.
In this chapter we will cover the following:
- What is the Intrusion Kill Chain?
- Some ways that the traditional Kill Chain model can be modernized
- Factors to consider when planning and implementing this model
- Designing security control sets to support this model
Since the MITRE ATT&CK® framework is also popular, very useful, and complementary to the Intrusion Kill Chain, I’ll ...
Get Cybersecurity Threats, Malware Trends, and Strategies - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.