By understanding the cyber kill chain we have the chance to take defensive action against an adversary. But first we need a solid network that is 100 percent in compliance with its mandatory IT controls. We often perform IT audits on clients enterprise networks and see less than 100 percent compliance achieved. We have the upper proactive (protection, detection) events of Recon, Weaponize and Deliver. In the lower area we have Reactive (response, recovery) events such as Install, Command & Control and Act on objectives.”]

