Course MGT-473

Instructor-Led Training (Live)

Organizational Cybersecurity Information Sharing

hours
0

This course introduces fundamental cyber information sharing concepts that can be incorporated into a cybersecurity program for both inside and outside an agency or organization. It introduces the purpose and value of information sharing and how sharing can assist with cyber incident preparedness and response before, during and after a cyber incident occurs.

Course content will assist participants to recognize common types of shared cyber information; understand when to share cyber information with trusted entities and partners; and will explore common methods of securely reporting cyber information. At the end of this course, participants will be able to identify activities needed to establish information sharing policies to be incorporated in a cybersecurity program. 

Objectives
  • recognize the uses and value of cyber information sharing before, during, and after an incident
  • analyze information that should be shared before, during, and after a cyber incident
  • compare internal and external sharing relationships to develop an effective information sharing program
  • recognize when to share cyber information to internal or external entities
  • perform collection and analysis of a cyber incident, then determine what information will be disseminated through a basic cyber information report
  • develop an action plan to enhance their information sharing capabilities for a cybersecurity program
Target Audience

Decision makers and upper-level management, government administrators, jurisdictional and/or state, policy makers, and technical personnel involved with managing and implementing an information sharing program. These individuals will have budgetary responsibility within the organization and will have influence within the organization to implement an information sharing program.

Cybersecurity is an urgent topic and most organizations recognize they need to do more to better prepare. Organizations may have addressed some information sharing aspects to enhance their cybersecurity posture but may not have assessed how cyber threat information sharing can improve their overall program. 

What have other participants found valuable about this course?

“Just learning new things I didn’t know, even though I’ve been in a cyber analyst role for several years now.”

“Walking everyone through the information sharing report was a great exercise. It is one thing to listen to best practices and another to sit down and put them to action. I know it can be difficult in Webex to make this work, but the team did a fantastic job!! This was by far, the most valuable part of the training, in terms of thinking through each facet of info sharing. Kudos!”

“I learned about tools and resources that I can recommend to our and other organizations’ cybersecurity staff, and I acquired new vocabulary to help me better communicate with those staff.”

“I thought the activities were key in putting into practice what we were covering in the material.”

“The course as a whole gave me a better understanding of the information sharing process and will enable me to better train PIOs and others in various departments, agencies and public sector entities.”

Register Now

Registration is open for this course:

  • Honolulu, HI
    • July 28-29, 2025
    • Part of a 2-week, 4-course run at Fort Ruger:
      • Attend up to 4 courses:
      • All 8 a.m. – 5 p.m.
      • All at Ft. Ruger, Hawaii National Guard Headquarters:
        • Room 113, Building 306
        • 3949 Diamond Head Rd
        • Honolulu, HI 96816
    • Register here

Like this course? Share with others!

To find out how to contact your State’s Homeland Security Training Office, visit FirstResponderTraining.gov. Click on your state for contact information.

Thousands trained at no cost

Be the next in line to get cybersecurity education for individuals, organizations, and jurisdictions without spending a dime.

Join the NCPC mailing list