Measuring the efficacy of cybersecurity strategies
Let me reacquaint you with two concepts that I introduced in Chapter 1 and mentioned again in Chapter 8. We are going to use these two concepts to measure the potential efficacy of the strategies that we examine.
Remember that the five ways that organizations get initially compromised, called the Cybersecurity Usual Suspects, are:
- Unpatched vulnerabilities
- Security misconfigurations
- Weak, leaked, or stolen credentials
- Social engineering
- Insider threats
Once an IT environment has been initially compromised, there are many, many tactics, techniques, and procedures (TTPs) that attackers can use to move laterally, steal credentials, compromise infrastructure, remain persistent, steal information, destroy data and infrastructure, and so on. Most of these TTPs have been around for years. Occasionally, the industry will see attackers employing novel approaches. Mitigating the Cybersecurity...