Info Sharing and Analysis
Sharing Cybersecurity Information among Localities States Tribes Territories Regions
- We recognize that not all organizations within the community are equally prepared to defend against potential cyber incidents
- A targeted attack on one organization could affect the entire community and the organizations within it
- We work with both organizations and geographically-based communities to establish a comprehensive cybersecurity program by using the CCSMM
- Below is an overview of three key programs – on a local, state and national level – that can help you develop or enhance an information sharing group or establish a cybersecurity program for your area

The ISAO Standards Organization works with existing information sharing organizations, owners and operators of critical infrastructure, relevant agencies and other public- and private-sector stake-holders through a voluntary consensus standards development process to identify a common set of voluntary guidelines for the creation and functioning of ISAOs.
Tagged information sharing, ISAC, ISAO