RESOURCES

The SMB iSAO has a Cybersecurity Operations Center (SOC) at the ISAO Cyber Support Center, located in Colorado Springs, CO. The cybersecurity analysts operating in the SOC use several tools to analyze and share information with the ISAO members as well as with other ISAOs. SMB iSAO’s tools include TruStar, Dunami, i2 Analyst Notebook and DHS-AIS Stix/Taxii.

WEEKLY THREAT ALERTS

NEWSLETTERS

WHITE PAPERS

Alerts, Newsletters and Whitepapers exclusive to members only. Click below to join today.

Become A Member

Alerts, Newsletters and Whitepapers exclusive to members only. Click below to join today.

WHY SHOULD WE SHARE

HOW IS INFORMATION SHARED?

The ability for a company to share and receive actionable cyber threat information with fellow industry groups, to protect their own networks, is an inherent benefit of participating in an ISAO. Increased and more timely awareness of cyber risks will allow companies to implement effective mitigations and reduce the frequency and impact of cyber incidents.

CYBER INFORMATION SHARING AND COLLABORATION PROGRAM

CISCP is DHS’s flagship program for public-private information sharing. In CISCP, DHS and participating companies share information about cyber threats, incidents, and vulnerabilities. Information shared via CISCP allows all participants to better secure their own networks and helps support the shared security of CISCP partners. Further, CISCP provides a collaborative environment where analysts learn from each other to better understand emerging cybersecurity risks and effective defenses.

Information sharing is a key pillar of effective cybersecurity. By sharing information rapidly between the government and the private sector, network defenders can block cyber threats before damaging compromises occur. DHS’s National Cybersecurity and Communications Integration Center serves as the hub of information sharing activities to increase awareness of vulnerabilities, incidents, and mitigations. In CISCP, DHS and participating companies share information about cyber threats, incidents, and vulnerabilities.

Information shared via CISCP allows all participants to better secure their own networks and helps support the shared security of CISCP partners. Further, CISCP provides a collaborative environment where analysts learn from each other to better understand emerging cybersecurity risks and effective defenses. CISCP is based upon a community of trust in which all participants seek mutual benefit from robust information sharing and collaboration. CISCP is free of charge and provides value to all members. Therefore, all companies with an interest in multi-directional cybersecurity information sharing and robust analytic collaboration between the government and the private sector should consider joining CISCP.

ENHANCED CYBERSECURITY SERVICES

The ECS program is a voluntary information sharing program that helps U.S.-based public and private entities defend their systems against unauthorized access, exploitation, or data exfiltration. ECS achieves this by sharing sensitive and classified cyber threat information with approved Commercial Service Providers (CSPs), which enables the CSPs to better protect their ECS customers.

The Department of Homeland Security’s ECS program is an intrusion prevention capability that helps U.S.-based companies protect their computer systems against unauthorized access, exploitation, and data exfiltration. ECS works by sharing sensitive and classified cyber threat information with accredited Commercial Service Providers (CSPs). These CSPs use that information to block certain types of malicious traffic from entering customer networks. ECS is meant to augment, but not replace, existing cybersecurity capabilities.

 

FREQUENTLY ASKED QUESTIONS

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

News & Event Updates

Ongoing Cybersecurity Training (FREE)

Small Business Development Center, Colorado Springs, CO — “A cybersecurity breach can break a small business, and now the Pikes…

RECENT BLOG POSTS

Your Holiday Cyber Safety Guide

The holiday season is the most critical time of the year for most business. And with all efforts focused on…

From Bad to Worse

By now, we’re all aware of the recent set of security chip vulnerabilities, known as Meltdown and Spectre, affecting modern…

SMB iSAO speaks at ISAO Standards Organizations Inaugural Event

Capitalizing on the National Cybersecurity Awareness Month, the ISAO’s Standards Organization hosted the Inaugural International Information Sharing Conference in Washington…