diff --git a/docs/conclusion.rst b/docs/conclusion.rst index 97c5065..e3b2e8d 100644 --- a/docs/conclusion.rst +++ b/docs/conclusion.rst @@ -3,18 +3,17 @@ Conclusion This new model is intended to complement existing cybersecurity frameworks and maturity models by focusing on the degree to which threat information is optimally leveraged in an organization’s defenses. It outlines key components of cybersecurity likely to benefit most from leveraging threat information, along with defined levels of incorporation -of that knowledge for each. This model should be considered a hypothesis of what constitutes an effective threat-informed defense, to be revised and improved as evidence is +of that knowledge for each. This model should be considered a hypothesis of what constitutes an effective threat-informed defense to be revised and improved as evidence is gathered through its use. Acknowledgements ------------------ +The project team would like to thank our CTID participant companies for their support, engagement, and feedback. We would also like to thank all the experts internal and external to MITRE who provided their knowledge and technical review. + The M3TID project team includes: * Forrest Carver * Steve Luke * Ivy Oeltjenbruns - -The project team would like to thank our CTID participant companies for their support, engagement, and feedback. We would also like to thank all the experts internal and external to MITRE who provided their knowledge and technical review. -