Modernizing the kill chain
One consideration before implementing this framework is whether defenders should use the original Intrusion Kill Chain framework or update it. There are several ways this framework can be modernized. I'll give you some ideas on how this can be done in this section. However, don't be afraid to embrace the notion of iterative improvement based on your organizations' experiences with this framework or others.
Mapping the cybersecurity usual suspects
In Chapter 1, Ingredients for a Successful Cybersecurity Strategy, I introduced the cybersecurity usual suspects and have referred to them throughout this book. I hope I have imparted the importance of mitigating the five ways that organizations are initially compromised. The Intrusion Kill Chain framework can be modified or reorganized around the cybersecurity usual suspects to ensure that they are mitigated and make it easier to identify gaps in an organization's security posture. This...