Accession Number:

AD1107887

Title:

Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations

Descriptive Note:

Technical Report

Corporate Author:

MITRE CORP MCLEAN VA MCLEAN

Personal Author(s):

Report Date:

2015-01-01

Pagination or Media Count:

11.0

Abstract:

Actionable threat intelligence plays a critical role in cyber defense, from helping to protect systems and data, to protecting organizations, industries, and even countries. A number of recent highly-publicized breaches has led to considerable activity in both the public and private sector to enhance capabilities to collect, utilize, and share cyber threat information.1 2 Many organizations, however, struggle with introducing threat intelligence into their defenses, relying predominantly on static defensive measures and compliance-oriented processes. Transitioning to a threat-oriented posture is not easy, and change needs to occur across the triad of people, processes and technologies.

Subject Categories:

  • Cybernetics

Distribution Statement:

APPROVED FOR PUBLIC RELEASE