Attacking the Kill Chain

No person acts truly random, and no person has truly infinite resources at their disposal. Thus, it behooves us in CND (Computer Network Defense) to record, track, and group information on our sophisticated adversaries to develop profiles. With these profiles, we can draw inferences, and with those inferences, we can be more adaptive and effectively defend our data. After all, that’s what intelligence-driven response is all about: defending data that sophisticated adversaries want. It’s not about the computers. It’s not about the networks. It’s about the data. We have it, and they want it."

It’s not about the networks. It’s about the data. We have it, and they want it.