About Us
IACI’s Mission
Advancing Security Resilience By Accelerating Public-Private Information Sharing, Analysis & Response, Supported By Best Practice Adoption, and Education
Who We Are
IACI is a for-profit organization dedicated to serving the cybersecurity needs of all sectors and industry. Established in 2016, IACI became formally recognized by the U.S. Department of Homeland Security (DHS) as authorized Information Sharing and Analysis Organization.
IACI brings together leading organizations, cybersecurity experts, and government partners to create a unified front against persistent and evolving cyber threats. IACI operates separate ISACs and ISAOs, and assists third-parties as a a central hub for threat information, a forum for peer-to-peer knowledge exchange, and a resource for incident response support.
What We Do
IACI advances information sharing advocacy and capacity building including supporting and assisting critical infrastructure owners and operators, sectors, sub-sectors, government, other communities-of-interest and individual organizations to rapidly operationalize a first class information sharing community or organization (ISAO / ISAC) by providing proven expert guidance and technology, moving rapidly from concept to operations.
IACI provides new and established ISACs/ISACOs Strategic Blueprints and concepts and assistance which includes: Information Sharing Governance Bylaws, Policies, Protocols, and Procedures, Information Sharing Agreements, Vendor/Teaming Agreements, Strategic Plan, Business Plan, Financial Controls/Budgeting, Operations Plan, Resource Plan, etc.)
IACI seeks to play a crucial role in improving the nation’s cybersecurity posture by creating environments for its members to share and discuss information and best practices
IACI Assists Communities To:
- Form a Legal Business Entity or Establish an Information Sharing Organization Division within Existing or New Organizations
- Meet Security, Information Sharing, and Privacy Standards and Best Practices
- Develop Governance, Bylaws, Policies, Procedures, Financial Controls / Budget, Information Sharing Agreements, Vendor Agreements, Consultant / Employee Agreements
- Develop Marketing & Social Media
- Develop a Winning Strategy – Strategic Plan and Business Plan
IACI Provides A Formula For:
- Enabling Individual and Organizational Global Public-Private Cooperation / Collaboration / Coordination
- Defining the Information Sharing Value Proposition – Products, Services and Support, Multi-Sector & Multi-Discipline Engagement
- Sharing and Coordinated Threat Intelligence and Response within and Across Critical Infrastructure
- Marketing, Building and Sustaining Participation – Ensuring ROI
- Access to Security Team Resources – Management, Analysts, etc.
IACI Provides Access To:
- Assistance in Participating in Risk Reducing Information Sharing Activities
- Analysis of Sector and Cross-Sector Risks
- US and International Policy – ISAO Advocacy, ISAO Global Network
- IACI ISAO / ISAC Management, Operations, Analysts, and Technology
- IACINet Intelligence Infrastructure – Technology, Products, Services,
- Strategic Partner Discounted Products & Services
- Research, Testing, Education & Training
Our Commitment to Trust and Confidentiality
At the core of the IACI is an unwavering commitment to trust and the secure handling of sensitive information. We adhere strictly to robust data classification policies, including the Traffic Light Protocol (TLP), to ensure that all shared intelligence is disseminated only to appropriate audiences. Our platforms are built with enterprise-grade security, and our operations are governed by a strict Acceptable Use Policy to protect the integrity and confidentiality of our community’s contributions.
FAQs
What is an Information Sharing and Analysis Center?
ISACs are groups that gather, analyze, and disseminate cyber threat information. ISACs and ISAOs (Information Sharing Analysis Organizations) can be directly tied to critical infrastructure sectors, but are not required to be.
ISACs seek to play a crucial role in improving the nation’s cybersecurity posture by creating environments for its members to share and discuss information and best practices.
ISACs and ISAOs have been authorized by the 2015 U.S. Presidential Executive Order 13691 which promotes private sector cybersecurity information sharing.
IACI fosters a public and private collaboration in conjunction with each other where data and information is shared between the two and across the different sectors and groups of interest.
How is an ISAO or ISAC Authorized?
The 2015 Cybersecurity Information Sharing Act (CISA) is a US federal law that aims to improve cybersecurity through enhanced information sharing between the government and private sector. It allows for the sharing of cyber threat indicators and defensive measures, while also providing protections for organizations participating in the information sharing process.
CISA (Cybersecurity Infrastructure Security Agency) provides legal protections to encourage companies to share threat intelligence with the government, including federal antitrust exemptions, protection from state and federal disclosure laws, and the designation of shared information as commercial, proprietary, and financial.
ISAO – Strategic Blueprint
IACI provides expert guidance, tools, technologies, operational / resource / management support to rapidly operationalize a first-class security information sharing community.
Information sharing organizations may be formed based on region, critical infrastructure sector, sub-sector, additional communities-of-interest, or other affinity public or private.
IACI enables perspective Information Sharing Entities to create and form a cost effective ISAO or ISAC. Giving each ISAO the capabilities to communicate, and proactively manage and share threat and defensive measures intelligence which will reduce security risks across the member group(s).
Join IACI
IACI Empowers Organizations To Enhance Their Cybersecurity Posture By Providing:
– A Trusted, Secure Platform For Actionable Threat Intelligence
– Fostering Critical Peer-To-Peer Collaboration
– Offering Expert Guidance For Proactive Defense And Accelerated Incident Response










