Office hours
Drop in 'office hours' advisory sessions where members can seek guidance on cyber issues.
The CI-ISAC leverages central resources and collective experience to support smaller entities that would not normally be able to effectively participate in cyber threat sharing.
Engagement has been designed to provide multiple virtual options for members to consume intelligence and services delivered by the CI-ISAC.
Drop in 'office hours' advisory sessions where members can seek guidance on cyber issues.
Fortnightly Threat briefings, including relevant strategic updates.
Fortnightly National Critical Infrastructure Threat Intelligence Forum (NCI-TIF) represented by sector leads to share key observations.
Dedicated sessions to help members get the most out of their CI-ISAC membership.
Virtual sessions aimed at educating and informing members on threats to Critical Infrastructure.
On demand access to local intelligence analysts (coming H2-23) .
Intelligence Sharing has been designed to reduce friction for member organisations, with central vetting and enrichment provided by CI-ISAC.
Intelligence analysts triage, validate and enrich shared information, prior to publishing out to members via alerts and relevant technical feeds depending on the assessed risk. Options to share in the CI-ISAC ecosystem include both email and the CI-ISAC Threat Platform.
CI-ISAC reporting focuses on cyber threats that are likely to pose an actual risk to members, filtering out unnecessary noise.
Weekly Threat Brief (WTB) – top campaigns & threats observed over the last week.
Issued ad-hoc for high-risk public and private vulnerabilities.
Issued ad-hoc for high-risk threats identified by members and CI-ISAC intelligence analysts.
Executive focused summary of strategic threats and trends. (coming H2-23)
Deep-dives on specific threats relevant to members. (coming H2-23)
For any specific membership enquiries, please contact info@ci-isac.org.au
One of the most important lessons we have learned in 2022 is that taking a strictly reactive approach to cyber security can, in fact, slow down or put an organisation’s competitiveness, financial position, and market growth at risk. Proactive and even predictive cyber-security operations are becoming an important factor for security leaders, as well as creating procedures to effectively fuse security into the business. Fusing security into the business necessitates Intelligence Sharing and Collective Defence.