Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
The seven steps of the Cyber Kill Chain® enhance visibility into an attack and enrich an analyst’s understanding of an adversary’s tactics, techniques and procedures.
Targeted, Coordinated, Purposeful
Month after Month, Year after Year
Person(s) with Intent, Opportunity, and Capability
Cyber Connect offers access to our cyber experts, current cyber job openings, webinars, tech-talks, and continued learning.
The Cyber Kill Chain®: A LOCKHEED MARTIN OVERVIEW
Applying Cyber Kill Chain® Methodology
Guide: Download the analyst’s guide to understanding and applying the Cyber Kill Chain® methodology to network defense.
Change How Your Team Handles Incidents
White Paper: Examine seven ways to apply the Cyber Kill Chain® with a threat intelligence platform.
Cybersecurity: Coding Out Crime
Cyber criminals aren’t a new threat, but how we respond to them has radically changed.
Whitepaper: Examine an alternate approach to information security that more accurately reflects how networked systems must be defended.
Threat-Driven Approach to Cyber Security
White Paper: Examine methodologies, practices and tools to enable a functionally integrated cybersecurity organization using Intelligence Driven Defense® practices.
Hear From Our Experts
Eric M. Hutchins
LM Fellow Chief Intelligence Analyst, LM-CIRT
Eric Hutchins is a Lockheed Martin Fellow and the Chief Intelligence Analyst for the LM Computer Incident Response Team (LM-CIRT). This team is responsible for detecting, assessing, and mitigating information security threats across the global enterprise. Eric is at the forefront of industry and government collaboration to develop new, more effective computer network defense (CND) tradecraft.Download White Paper: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains