Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
The seven steps of the Cyber Kill Chain® enhance visibility into an attack and enrich an analyst’s understanding of an adversary’s tactics, techniques and procedures.
Targeted, Coordinated, Purposeful
Month after Month, Year after Year
Person(s) with Intent, Opportunity, and Capability
The Cyber Kill Chain®: A LOCKHEED MARTIN OVERVIEW
How to Get a Job in Cybersecurity: Career Advice
Interested in cybersecurity? Not sure what to study or how to prepare? Our Lockheed Martin experts share advice about how to get a cyber job.
Applying Cyber Kill Chain® Methodology
Guide: Download the analyst’s guide to understanding and applying the Cyber Kill Chain® methodology to network defense.
Change How Your Team Handles Incidents
White Paper: Examine seven ways to apply the Cyber Kill Chain® with a threat intelligence platform.
Whitepaper: Examine an alternate approach to information security that more accurately reflects how networked systems must be defended.
Threat-Driven Approach to Cyber Security
White Paper: Examine methodologies, practices and tools to enable a functionally integrated cybersecurity organization using Intelligence Driven Defense® practices.
Cybersecurity: Coding Out Crime
Cyber criminals aren’t a new threat, but how we respond to them has radically changed.