Chapter 8

CERTs, ISACs, and intelligence-sharing communities

Abstract

Outside of the world of data feeds, there are a number of excellent sources of information that can provide broad, sector specific, and even company-specific information that can be used to produce finished intelligence within an organization. This chapter provides an overview of some of those sources.

Keywords

CERT
CSIRT
ISAC
FS-ISAC
IT-ISAC
ICS-ISAC
SARA
NH-ISAC
MS-ISAC
R-ISAC
Air Domain Intelligence Integration Center
Vorstack
Soltra
ThreatConnect
Information in this chapter
CERTs and CSIRTs
ISACs
Intelligence-sharing communities

Introduction

Building out an intelligence-led security program is hard; doing it alone is almost impossible. The good news is ...

Get Building an Intelligence-Led Security Program now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.