Cyber Defense Maturity Evaluation

Broad-based threats and beyond.

Know where you stand against advanced adversaries so you can optimize utilization of intelligence across the entire enterprise.


Cyber Defense Maturity Evaluation

The Cyber Defense Maturity Evaluation takes an all-inclusive view across the entire enterprise and more specifically the components responsible for network and system defense. Centered on the concepts of the Unified Enterprise Defense strategy, a baseline is determined through evaluating how an organization’s current security program utilizes internal and external cybersecurity intelligence to defend against common adversaries and highly sophisticated threats.

The evaluation process is completed through a detailed questionnaire, documentation reviews, onsite discovery interviews, and detailed information exchanges with security program teams. Findings result in measurable and repeatable recommendations based on industry standards and best practices.



The most effective way to thwart targeted, sophisticated and persistent cyber threats is to have a mature cyber defense program. The Cyber Defense Maturity Evaluation measures an organization’s alignment to the Unified Enterprise Defense strategy across 13 key evaluation domains and sub-components, to quantify an organization’s cybersecurity defensive posture.


Built on Our Unified Enterprise Defense Strategy

The Unified Enterprise Defense structure was developed by Leidos to outline and characterize all of the important elements that an organization must develop and integrate cohesively, to have an effective strategy for securing and defending an enterprise from all cybersecurity threats. The name itself provides context to its core meaning:



Collaboration and cooperation between multiple disciplines and teams contributing to securing the enterprise



Scale, depth, and breadth of the organization’s business objectives, activities, networks, and systems



Active measures taken to defend against all threats that may impact the enterprise

Unified Enterprise Defense Lifecycle cybersecurity Lifecycle

Unified Enterprise Defense Lifecycle

  1. SEE: Monitor cyber activity
  2. UNDERSTAND: Identify and isolate advanced cyber threat activity from normal network or system traffic
  3. ORIENT: Determine a course of action
  4. RESPOND: Take action to implement defenses and execute mitigations
  5. LEARN: Build new, actionable intelligence

Find out how your organization measures up.

Request an evaluation.