Blog

A Threat-Informed Community is Necessary for Defense to Function

A Threat-Informed Community is Necessary for Defense to Function

By Suneel Sundar • February 12, 2026

Center for Threat-Informed Defense 2026 R&D Roadmap

2026 R&D Roadmap banner

Threat-informed defense changes the game on the adversary. Threat-informed defenders read their adversaries’ playbooks and then orchestrate a defense based on that knowledge. MITRE ATT&CK® is the core of threat-informed defense as our framework of adversary tactics, techniques, and procedures (TTPs). From this foundation, we build detection rules that find and security controls that mitigate adversary actions. From this inspiration, we defend AI-enabled systems and document the playbooks of insider threats and fraud actors. In 2026, the MITRE Center for Threat-Informed Defense (CTID) continues to bring tradecraft out of the shadows and deliver tailored practical, research-driven defenses for the global cybersecurity community.

Executive Summary

A threat-informed community is essential for effective cyber defense. In 2026, the MITRE Center for Threat-Informed Defense (CTID) will focus its R&D program on a clear set of outcomes that help defenders operationalize adversary behavior at scale. Our 2026 roadmap centers on six lines of effort:

  • Summiting the Pyramid: Increase detection robustness by advancing methodologies, scoring, and telemetry analysis that raise adversary costs and make evasion measurably harder.
  • Insider Threat: Apply Ambiguous Techniques methods to insider TTPs so programs can distinguish benign from malicious use of common behaviors.
  • Security Capability Mappings: Expand and modernize mappings between ATT&CK and leading control frameworks, using AI-enabled processes to keep mappings current with ATT&CK v18 and evolving vendor capabilities.
  • Program Maturity (INFORM): Provide a strategic model to measure and mature threat-informed defense across the entire security program, complementing tactical capability maturity models.
  • Fight Fraud: Extend the Fight Financial Fraud framework with additional techniques, datasets, and mitigations, connecting cyber detections with material fraud events in more sectors.
  • Attack Flow and AI Security: Evolve Attack Flow, Technique Inference Engine, and ATLAS to cover more domains and AI-enabled systems, integrating ML and automation to speed emulation design defenses.

This roadmap is designed to guide defenders toward capabilities to adopt, integrate, and scale—so organizations can start quickly, then continuously get better at threat-informed defense.

Summiting the Pyramid: Detect Adversary Behaviors

David Bianco's Pyramid of Pain
David Bianco's Pyramid of Pain

David Bianco’s Pyramid of Pain introduced the defenders to the idea that by identifying and detecting adversary tactics, techniques, and procedures (TTPs), it would be harder for adversaries to evade detection. The higher up the Pyramid a defender can detect, the greater the cost imposed on the adversary. Many detection analytics are vulnerable to low-cost adversary evasion. CTID’s Summiting the Pyramid (STP) methodology defines and quantifies detection robustness—how difficult it is for adversaries to evade a detection.

CTID's Summitting the Pyramid version of the Pyramid of Pain
Summiting the Pyramid Levels

Building on this work, CTID advanced detection engineering through its Ambiguous Techniques research. Because many ATT&CK techniques are living-off-the-land and not inherently malicious, this work focused on determining the telemetry required to distinguish benign from malicious behavior. We grouped ambiguous techniques into adversary use cases, analyzed the log sources required to detect those use cases, and moved detection analysis beyond individual techniques to the telemetry needed to observe real adversary behavior.

Ambiguous Techniques exposes a critical reality: modern adversaries deliberately operate in the gray space between benign behavior and malicious action.

Douglas Jose Pereira dos Santos: Director, Advanced Threat Intelligence, Fortinet

We then introduced a confidence score to identify which log sources consistently produce high fidelity detections. By evaluating confidence across use cases we identified the log sources that consistently produce high-fidelity detection, which justifies data collection and detection investment. We further scaled this using LLM-driven Retrieval-Augmented Generation to automate confidence scoring across telemetry sources.

In 2026 CTID’s research will answer questions in detection that are operationally relevant now to threat-informed defenders:

  • How to measure the completeness of telemetry using ATT&CK v18 data and field-level mappings
  • How compound detections increase robustness and raise the cost of evasion
  • What it means to have “coverage” of an ATT&CK technique, including required log sources and context to classify activity with confidence

Insider Threat: If You’ve Seen One Insider Threat Program, You’ve Seen Exactly One Insider Threat Program

MITRE CTID’s Insider Threat research began with acknowledgement that insider threat practitioners did not have a common language to share non-attributable observation of insider techniques. So we published the first evidence-based, cross-sector, community-sourced, and openly accessible knowledge base of the TTPs used by insiders in the enterprise environment: the Insider Threat TTP Knowledge Base. MITRE CTID then expanded the techniques of the Insider Threat KB, prescribed detection tools and preventative measures for insider techniques, and defined Observable Human Indicators (OHIs): qualitative and objective attributes of insider threat actors that add context to the TTPs.

Consider now these dozens of sequences of seemingly benign techniques that were used maliciously by insider threat actors. In 2026 our Insider Threat research will apply CTID’s Ambiguous Techniques methodology to the InT KB data set and derive context and observational principles to distinguish when possibly benign techniques (such as zipping files or utilizing ipconfig) are used by insider threat actors for malicious ends.

Finally, we will demonstrate how an insider threat program can avail itself of CTID research and results. We will define pre-requisites for insider threat programs to use the InT KB, OHIs, and the Ambiguous Techniques methodology. For organizations that are building an insider threat program, we will document technology, policy, and governance best practices. These recommendations will demonstrate the necessary conditions to implement the detection and mitigation results derived in the Insider Threat TTP Knowledge Base.

The Best Defense is a Security Capability Mapping to ATT&CK

Security capability mappings connect the defenses you’ve invested in to the specific threats that keep you up at night. In January 2026, we mapped adversary behaviors to the Cloud Security Alliance Cloud Controls Matrix (CCM), a set of cloud security controls that address technical and operational aspects of cloud computing across shared responsibility models. The mappings demonstrate how these industry-recognized cloud controls can mitigate specific adversary behaviors. The mappings establish a shared foundation across teams so that organizations will apply threat-informed defense consistently across cloud environments.

  • CTI analysts produce ATT&CK-based threat intelligence
  • Offensive SecOps teams identify and validate ATT&CK-based detections in use
  • Detection engineers implement CCM countermeasures for observed threats
  • Security officers align threat management with business objectives

ATT&CK updates to a new major version twice a year, and security vendors constantly change their offerings. Continuing in 2026, CTID’s Mappings Program will deliver new collections for threat-informed defensive measures and update the existing mappings collection to reflect techniques in ATT&CK v18. These and our continual updates are available on the Mappings Explorer platform. This year, we will scale the Mappings Program by using an AI-enabled process to align security capability mappings with the latest versions of ATT&CK.

Some mappings relate adversary behaviors documented in ATT&CK to security controls or compliance frameworks. For example, the NIST 800-53 mappings enable cybersecurity architects to cross walk between adversary behaviors and defensive posture. CTID will grow the corpus of mappings in 2026 by:

  • Aligning ATT&CK techniques with ISO/IEC 27001 to incorporate real-world threat information into information security and the risk management process 
  • Mapping CIS Controls to ATT&CK techniques to enhance the design and implementation of a threat-informed operational cybersecurity program 
  • Connecting ATT&CK threat information to cyber resiliency constructs for secure system design like NIST 800-160 and CSEIG Cyber Survivability Attributes

Build, Measure, and Mature Threat-Informed Defense

In 2024, MITRE CTID undertook the effort to Measure, Maximize, and Mature Threat-Informed Defense (M3TID) by advising organizations on incremental efforts to implement and improve their threat-informed defense. Our 2026 research publication INFORM retains that core intent and sharpens it to address how organizations operate today.

MITRE INFORM Assessment
MITRE INFORM Assessment

INFORM builds upon the M3TID model and evaluates threat-informed defense as holistic practice rather than a series of initiatives. Key advances include:

  • Rebalanced scoring algorithm and components that acknowledge that some security decisions have greater impact than others
  • Levels that reflect operational urgency and cross-functional teams because progress relies on coordination across intelligence, operations, engineering, and leadership
  • Personalized recommendations that balance Impact - the defensive value of implementation against Complexity - the organizational and technical effort required to enact it.
  • A web-based assessment tool designed for repeated use to:
    • Track progress over time.
    • Download an executive summary

INFORM provides a program-level view and complements models that focus on specific teams and functions. For example, capability maturity models such as CTI-CMM, SOC-CMM, and Red Team-CMM, typically operate at the tactical level, driving depth within a function. INFORM tells leaders whether the overall program consistently applies threat-informed defense and where coordinated investment will improve outcomes.

Fight Fraud

The problem of financial fraud is prime for the application of threat-informed defense. When we address financial fraud at the time of the material event, we react. It would be like placing our controls for intellectual property theft exclusively in the exfiltration stage.

Our Fight Financial Fraud (F3) framework enables fraud defenders by codifying the tactics and techniques used in fraud events. Fraud actors use some ATT&CK techniques with traditional fraud techniques, making cyber-fraud fusion framework necessary. After initial publication in March 2026, we will add additional fraudster techniques, data sources that detect the techniques, and mitigations to reduce harm from fraud.

With our members we seek to expand the Fight Fraud research area to additional sectors like retail fraud, health benefits, and aviation. The foundation remains to unite the events detected through cyber means with the material fraud event via data fusion and analysis.

Prioritizing Adversary Techniques That Matter Most

Top ATT&CK Techniques provided defenders with a structured, transparent approach to prioritize ATT&CK techniques. That work established a practical starting point for defensive effort and enabled organizations to align resources against the techniques most relevant to themselves. Since then, adversary behavior has expanded and defensive practice has evolved. Notably in 2025, ATT&CK v18 introduced Detection Strategies and overhauled Analytics. In 2026 our Top ATT&CK Techniques renewal (TAT2) will evaluate, score, and prioritize techniques with empirical grounding and alignment to defensive action.

The TAT2 project will produce a prioritization methodology for ATT&CK techniques, supported by a fully documented scoring model. One component is prevalence data aggregate from public vendor threat reports. Another component is actionability, scored using ATT&CK v18 Detection Strategies and the mitigations contained in Mappings Explorer. The result is no fixed list. With TAT2, organizations will evaluate relative importance and apply the results in a way that reflects their own threats, environments, and defensive maturity.

Threat-Informed Defenders Think in Attack Flow.

As the saying goes, Defenders think in lists. Attackers think in graphs. But threat-informed defenders look at adversary behavior as sequences of actions rather than isolated TTPs. By looking at combinations of behaviors, defenders learn the relationships among them: how some techniques set up other techniques, or how adversaries handle uncertainty and recover from failure. Attack Flow is the language to describe how cyber adversaries combine and sequence various offensive techniques to achieve their goals.

Attack Flow Builder demonstration
Attack Flow Builder

Our research in Attack Flow has produced an on-demand training series and innovation from industry partners. In 2026 we will make it faster for you to build a flow by releasing an updated AI-enabled Attack Flow Builder.

We will also integrate the predictive model from Technique Inference Engine (TIE) into Attack Flow. TIE uses a machine learning model trained on cyber threat intelligence to recommend likely TTPs based on a set of known input TTPs. This project will modernize TIE’s dataset to include techniques tagged to ATT&CK for Enterprise v18.

With TIE, analysts discern what is likely to have happened given the evidence of what did happen. Cyber defenders use TIE’s recommendations to prioritize specific techniques for threat hunting; incident responders use this information to highlight lateral movement and persistence behaviors. Merging TIE into Attack Flow will:

  • Improve post-mortem incident analysis by highlighting inferred sensing, detection, and reporting gaps
  • Recommend similar or related attack vectors as part of cyber assurance
  • Accelerate the creation of Adversary Emulation plans

Another highlight of Attack Flow in 2026 is the addition of TTP frameworks such as MITRE ATLAS or ATT&CK for ICS to Attack Flow Builder. Adversaries execute across platforms and Attack Flow will map their journey wherever it may lead.

[Attack Flow] makes it easier than ever to quickly document chains of actions and choke points in adversary activities and show that information in easily consumed visualizations for different stakeholders.

David Vasil: Security Threat Architect, HCA Healthcare

Secure AI with Threat-Informed Defense

AI-enabled systems are susceptible to traditional cybersecurity vulnerabilities and new attacks. As consumers and organizations integrate AI-enabled systems into their business, adversaries exploit them. Defenders must unite to thwart these new threats.

OpenClaw attack pathways mapped to ATLAS techniques
OpenClaw attack pathways mapped to ATLAS

CTID applies a threat-informed approach to AI security that enables rapid exchange of new threat information, develops approaches to emulating those threats, and provides comprehensive and effective mitigation strategies. Moreover, we acknowledge that there is no pause in real-world attack observations and realistic demonstrations from Al red teams and security groups. In our research we must continually add to the knowledge base of adversary tactics and techniques against Al-enabled systems. In 2026 we will:

  • Expand the ATLAS Knowledge Base. Capture and characterize threats to AI-enabled systems by collecting empirical data from real-world observations and incorporate findings as structured updates to ATLAS. Furthermore in 2026 this research will identify data sources, analytics, and detection for threats to the AI-enabled system attack surface.
  • Operationalize ATLAS through Threat-Informed Security Tooling. Develop a set of operational tools to enable security teams to test, detect, mitigate, and respond to adversarial threats grounded in MITRE ATLAS TTPs. These tools will span across activities such as adversarial threat emulation, adversarial effects sample generation, vulnerability analysis, and proactive threat hunting, aligned to a set of operationally relevant test harness and simulated environments.
  • Identify Malicious Use of AI in Cyber. Identify AI-enabled adversary behaviors, such as attacks accelerated by GenAI.

Our R&D program has evolved in our consideration of AI. It is not practical to silo our AI research into a single AI project. So CTID will incorporate AI, ML, or automation as appropriate into each threat-informed defense project. Here are some examples:

  • Ambiguous Techniques: Incorporate LLM RAG to automate confidence scoring metric for telemetry sources. (releases Feb 19)
  • Flow Visualization 2026: Integrate the predictive model from Technique Inference Engine into Attack Flow
  • Mappings Omnibus 2026: Develop an AI-enabled process for performing mapping updates

If You’re Not Communicating, You’re Not Practicing Threat-Informed Defense

Threat-informed defense will always be a team sport. We are grateful for your feedback on the products of our research, on how you use CTID resources, and the content of our trainings, workshops, and other engagements. We aim to create widely-used, easily accessible, and practical resources through our R&D program. That is only possible with community support and engaged CTID Research Participants. Your feedback is key to evolving our work and maximizing its impact. Contact us here.

Join us to advance Threat-Informed Defense — CTID Research Participants are thought leaders with sophisticated security teams, advanced practitioners of threat-informed defense, and users of ATT&CK. With the understanding that the cyber challenges we face are bigger than ourselves, our members join CTID prepared to tackle hard problems in a uniquely collaborative environment. If this sounds like your organization, become a CTID Participant.

Stay informed — Be the first to know about R&D project releases by signing up for our Stay Informed newsletter and following us on LinkedIn.

Use CTID R&D and share your feedback — Let us know how you are using CTID R&D and allow us to continually refine our work, making it more accessible and impactful.


© 2026 The MITRE Corporation. Approved for Public Release. ALL RIGHTS RESERVED. Document number 25-02691-5.


About the Author

Suneel Sundar

As the Director of Research & Development in the Center for Threat-Informed Defense, Suneel leads and executes the Center’s research program with MITRE engineers, private sector partners, and U.S. government organizations that makes cyber attackers’ lives difficult. Suneel teaches Iyengar yoga in San Diego and over Zoom.

More by Suneel Sundar

Recent Blog Posts:

A Threat-Informed Community is Necessary for Defense to Function

Threat-informed defense changes the game on the adversary. Threat-informed defenders read their adversaries’ playbooks and then orchestrate a …

Continue reading

MITRE ATLAS OpenClaw Investigation Discovers New and Likeliest Techniques

MITRE ATLAS™ analyzed OpenClaw incidents that showcase how AI-first ecosystems introduce new exploit execution paths. OpenClaw is unique because …

Continue reading

Cloud Security Built with ATT&CK

Threats to cloud computing span multiple security domains, objectives, and layers of technology. Defenders must protect dynamic, shared …

Continue reading