WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Industry Expert Suggests the Cyber Kill Chain is Dead
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Industry Expert Suggests the Cyber Kill Chain is Dead

Author: Jennifer Walker

Created: Thursday, August 1, 2019 - 17:46

Categories: Cybersecurity, General Security and Resilience

Tom Kellermann, CSO of cybersecurity firm Carbon Black, recently published a whitepaper defining what he calls the Cognitive Attack Loop where he suggests it is time for a paradigm shift away from Lockheed Martin’s Cyber Kill Chain for cybersecurity defense. In Cognitions of a Cybercriminal, Kellermann contends defenders need to think in terms of a continuous loop, as opposed to a chain depicted with a defined beginning and end where it assumes actors will eventually exit the network. There are three phases to the Cognitive Attack Loop: recon and infiltrate; maintain and manipulate; execute and exfiltrate – along with the understanding that this loop repeats and evolves, as adversaries maintain network persistence. While the Cyber Kill Chain may seem rigid, the loop idea is not entirely new, as defenders have been aware of the persistence aspect of the adversary attack cycle for some time. Kellerman just brings the Cognitive Attack Loop model to the forefront and suggests defenders should not rely solely on the Cyber Kill Chain for network defense. Read the post at Security Week

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar