Measuring the efficacy of cybersecurity strategies
Let me reacquaint you with two concepts that I introduced in Chapter 1, Ingredients for a Successful Cybersecurity Strategy. We are going to use these two concepts to measure the potential efficacy of the strategies that we examine.
Remember that the five ways that organizations get initially compromised, the cybersecurity usual suspects, include:
- Unpatched vulnerabilities
- Security misconfigurations
- Weak, leaked, or stolen credentials
- Social engineering
- Insider threat
These are the five ways that organizations get initially compromised. Once an IT environment has been initially compromised there are many, many tactics, techniques, and procedures (TTPs) that attackers can use to move laterally, steal credentials, compromise infrastructure, remain persistent, steal information, destroy data and infrastructure, and so on. Most of these TTPs have been around for years. Occasionally, the...