Question

Before you respond to this discussion, review the YouTube video, "What is the Cyber Kill Chain?" in the Readings and Instructional Material section of Week 5. • How can you apply

the concepts from this video as part of an overall cybersecurity and cyber resilience strategy? • What processes, tools, and techniques do you think would be effective to discover and disrupt a cyber-attack while it's underway? This week's chapter of the course textbook focuses on threats, vulnerabilities, and the management processes needed to address them within the cybersecurity and cyber resilience strategy. Chapter 4 Cyber Threats, Vulnerabilities and Intelligence Analysis (Siegel and Sweeney 2020) https://www.youtube.com/watch?v=zhClg4cLemc%20