Source |
CSO |
Identifiant |
139105 |
Date de publication |
2016-09-28 07:41:00 (vue: 2016-09-28 07:41:00) |
Titre |
IDG Contributor Network: IT audits must consider the cyber kill chain and much more |
Texte |
Many articles have been written regarding the cyber kill chain as it pertains to threat intelligence. By understanding the cyber kill chain we have the chance to take defensive action against an adversary.But first we need a solid network that is 100 percent in compliance with its mandatory IT controls. We often perform IT audits on client's enterprise networks and see less than 100 percent compliance achieved. So I want to discuss how IT controls help us to have the proper framework in place to build that threat intelligence. Â To read this article in full or to leave a comment, please click here |
Envoyé |
Oui |
Condensat |
100 achieved action adversary against article articles audits been build but chain chance click client comment compliance consider contributor controls cyber defensive discuss enterprise first framework full have help here how idg intelligence its kill leave less mandatory many more much must need network network: networks often percent perform pertains place please proper read regarding see solid take than threat understanding want written â to |
Tags |
|
Stories |
|
Notes |
|
Move |
|