Intelligence Driven Defense Baseline Assessment

Broad-based threats and beyond.

Know where you stand against advanced adversaries so you can optimize utilization of intelligence across the entire enterprise.


Intelligence Driven Defense® Baseline Assessment

The Intelligence Driven Defense® baseline assessment evaluates and measures an organization’s alignment to our Intelligence Driven Defense® framework across 15 specific key evaluation domains. Assessment findings result in measurable and repeatable recommendations based on industry standards and best practices.

This assessment evaluates the security posture of an organization relative to a proactive Intelligence Driven Defense® organization. The evaluation process is completed through a detailed questionnaire, documentation reviews, discovery interviews, and detailed information exchanges with security program teams.

The Intelligence Driven Defense® baseline assessment process is centered on the concepts of the Cyber Kill Chain® methodology and Intelligence Driven Defense® framework. A baseline is determined through assessing how an organization’s current security program utilizes internal and external cybersecurity intelligence to defend against common adversaries and highly sophisticated threats.


The most effective way to thwart targeted, sophisticated and persistent cyber threats is to practice an intelligence-driven defense. The Intelligence Driven Defense® baseline assessment process evaluates 15 key evaluation domains against a four point scale to quantify an organization’s cybersecurity defensive posture.

What does a 4.0 look like? Download the perfect scorecard to find out.


Developing an Intelligence Driven Defense® culture is a journey.

Avoid common pitfalls along the way.


Intelligence Driven Defense® Lifecycle cybersecurity Lifecycle

Intelligence Driven Defense® Lifecycle

A threat-focused security program requires an ongoing commitment to Intelligence Driven Defense® principles. The Intelligence Driven Defense® baseline assessment evaluates a defender’s ability to accomplish five critical tasks:

  1. SEE: Monitor cyber activity
  2. UNDERSTAND: Identify and isolate advanced cyber threat activity from normal network or system traffic
  3. ORIENT: Determine a course of action
  4. RESPOND: Take action to implement defenses and execute mitigations
  5. LEARN: Build new, actionable intelligence

Find out how your organization measures up.

Request an assessment.