Published : May 10, 2022
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques. Our open methodology considers technique prevalence, common attack choke points, and actionability to enable defenders to focus on the ATT&CK techniques that are most relevant to their organization.
The Top ATT&CK Techniques Calculator makes building customized top technique lists easy. Users can create a top 10 technique list tailored to their organization.
The Top Ransomware Technique List provides a starting point for defending against ransomware attacks and demonstrates how the Top ATT&CK Techniques methodology can be tailored to different use cases.
Defending against all ATT&CK techniques is simply not practical, and without guidance, determining which techniques to focus on is overwhelming.
Publish a methodology and tools to help defenders systematically prioritize ATT&CK techniques.
Defenders focus on the adversary behaviors that are most relevant to their organization and have the greatest effect on their security posture.
Hear directly from research participants about this project and why it matters. Learn how these leaders are changing the game on the adversary.
Adoption Spotlights showcase the Center’s R&D in action to help the community adopt threat-informed defense. Learn how these organizations are leveraging Center R&D to change the game on the adversary.
Stay informed about new releases of R&D projects and other exciting updates from the Center for Threat-Informed Defense.