Navigating the Cybersecurity Landscape
Advance Persistent Threat
APTs are cyber attacks executed by sophisticated threat actors using effective TTPs.
TACTICS, TECHNIQUES AND PROCEDURES
Tactics (tools), Techniques and Procedures are patterns of activities or methodologies associated with a specific threat group.
Cyber kill chain
Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. It is a series of steps that trace stages of a cyber attack from the early reconnaissance stages to the ex-filtration of data.
Cyber Threat intelligence
Threat intelligence is a combination of knowledge, information and data – used by cyber threat analysts to prevent, and assist in mitigating cyber attacks.
CYBERSECURITY FRAMEWORK
IDENTIFY.
Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.
PROTECT.
Develop and implement appropriate safeguards to ensure delivery of critical services.
DETECT.
Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.
RESPOND.
Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.
RECOVER.
Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.
CYBERSECURITY RISK MITIGATION
A strategic process of taking steps to reduce adverse effects of a cyberattack. Prioritizing, evaluating, and implementing the appropriate risk-reducing controls/countermeasures recommended from the risk management process.