Services

The CI-ISAC leverages central resources and collective experience to support smaller entities that would not normally be able to effectively participate in cyber threat sharing.

Engagement

Engagement has been designed to provide multiple virtual options for members to consume intelligence and services delivered by the CI-ISAC.

Office hours

Drop in 'office hours' advisory sessions where members can seek guidance on cyber issues.

Threat Briefings

Fortnightly Threat briefings, including relevant strategic updates.

Threat Intelligence Forum

Fortnightly National Critical Infrastructure Threat Intelligence Forum (NCI-TIF) represented by sector leads to share key observations.

Member Services

Dedicated sessions to help members get the most out of their CI-ISAC membership.

Member Summits

Virtual sessions aimed at educating and informing members on threats to Critical Infrastructure.

Analyst on Demand (AOD)

On demand access to local intelligence analysts (coming H2-23) .

Sharing

Intelligence Sharing has been designed to reduce friction for member organisations, with central vetting and enrichment provided by CI-ISAC.

Intelligence analysts triage, validate and enrich shared information, prior to publishing out to members via alerts and relevant technical feeds depending on the assessed risk. Options to share in the CI-ISAC ecosystem include both email and the CI-ISAC Threat Platform.

Reporting

CI-ISAC reporting focuses on cyber threats that are likely to pose an actual risk to members, filtering out unnecessary noise.

Threat Briefs

Weekly Threat Brief (WTB) – top campaigns & threats observed over the last week.

Vulnerability Advisories

Issued ad-hoc for high-risk public and private vulnerabilities.

Threat Advisories

Issued ad-hoc for high-risk threats identified by members and CI-ISAC intelligence analysts.

Quarterly Threat Brief

Executive focused summary of strategic threats and trends. (coming H2-23)

Threat Reports

Deep-dives on specific threats relevant to members. (coming H2-23)


For any specific membership enquiries, please contact info@ci-isac.org.au

Proactive Cyber Security

One of the most important lessons we have learned in 2022 is that taking a strictly reactive approach to cyber security can, in fact, slow down or put an organisation’s competitiveness, financial position, and market growth at risk. Proactive and even predictive cyber-security operations are becoming an important factor for security leaders, as well as creating procedures to effectively fuse security into the business. Fusing security into the business necessitates Intelligence Sharing and Collective Defence.

Photo credits: