This presentation will explore how the cyber kill chain can be used as a defensive framework for security engineers, network defenders, senior managers, and more. This discussion will continue to guide the community from a vulnerability-centric to a threat-centric approach to security.