Incident Response, TDR

Applying the cyber kill chain

Organizations face an abundance of threats on a daily basis. While there are a slew of solutions in the marketplace that assist security practitioners in their battle against cyber criminals, following the blueprint of these attackers – also known as the cyber kill chain – may be one of their best resources. At least that's what analysts at Lockheed Martin have been doing.

The cyber kill chain involves the seven steps that an adversary needs to go through to attack a network and actually achieve action on objectives, according to Chandra McMahon, VP of commercial markets and former CISO at Lockheed Martin. Security analysts there have leveraged the kill chain in order to dissect advanced threats and link them together to create campaigns, which ultimately increases the organization's intelligence on their adversaries motives, as well as tactics and techniques.

In this video, SC Magazine Reporter Adam Greenberg chats with McMahon on ways organizations can leverage the cyber kill chain in order to improve their detection, mitigation, and defense posture.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.