Course AWR-381-W

Web-based Training (Self-Paced)

Establishing an Information Sharing and Analysis Organization

Length
0 h

About Course

The growing Information Sharing and Analysis Organization (ISAO) ecosystem provides an opportunity to empower the nation to become more educated and effective in preventing, detecting and responding to the increasingly sophisticated landscape of cyber threats. There are considerable challenges with the vast quantity of information, the complexities of analysis and the uncertainties of sharing data with a large network of organizations. This course assists communities of interest to establish an Information Sharing and Analysis Organization (ISAO).

The course will introduce the value proposition of creating an ISAO and provide considerations to joining an existing ISAO. The course will closely follow the guidance provided by the ISAO Standards Organization (ISAO SO), whose mission is to “improve the nation’s cybersecurity posture by identifying standards and guidelines for robust and effective information sharing and analysis related to cybersecurity risks, incidents, and best practices”.

Objectives

Upon successful completion of this course, participants will be able to:

  • Explain key concepts of the cyber threat information sharing landscape
  • Explain aspects of the cyber threat information sharing ecosystem
  • Differentiate between ISAO creation drivers
  • Explain aspects of an ISAO membership structure and organizational structure
  • Summarize plans supporting the ISAO business model
  • Explain how trust plays a major role for the success of the ISAO
  • Identify important privacy and security laws for an ISAO
  • Summarize the phases of the Information Sharing and Analysis Framework
  • Explain how partnerships enhance ISAO capabilities
  • Summarize various services and capabilities found in an ISAO
  • Develop a plan for building an ISAO

Target Audience

Public and private sector decision makers and upper-level management, government administrators, jurisdictional and/or state officials, technical and information security personnel involved with establishing an ISAO. This includes anyone associated with a Security Operations Center (SOC), Network Operations Center (NOC) or operations, as well as partnering organizations.

Prerequisites

Register

Upcoming

Nothing upcoming.

Online

Register online through our partner.

Contact

CIAS (UTSA)

Email

cias@utsa.edu

Phone

(210) 458-2119

Website

cias.utsa.edu

Future

To sign up for a future delivery for this course, join the waitlist by reaching out via the contact information. Click below to send a prefilled email.

Contact

CIAS (UTSA)

Email

cias@utsa.edu

Phone

(210) 458-2119

Website

cias.utsa.edu

Congressionally Funded Training Available

Thousands trained nationwide.

Join the NCPC mailing list