Anomalies and Events


 

Services that detect anomalous activity and help understand the potential impact of events. Select the services and agency provider logos below to contact service providers directly and learn more about how to obtain these services. 

Analysis & Detection

HHSAnalysis and Detection services ensure an agency's/division's information security program is fully implemented and maintained.

 

 


Cyber Threat Information Sharing (CTIS) - Automated Information Sharing (AIS)

CISAAIS enables the exchange of cyber threat indicators (CTIs) between the Federal Government; State, Local, Tribal, and Territorial (SLTT) governments; and the private sector at machine speed. AIS creates a cyber ecosystem that shares cyber threat intelligence on Indicators of Compromise (IOC) with partners in real time helping expand protection from that particular threat. The goal is to commoditize CTIs through AIS so that tactical indicators are shared broadly among the public and private sectors in near real-time, helping to better protect against cyber-attacks.


Cyber Threat Information Sharing (CTIS) - Shared Cybersecurity Services (SCS)

CISACTIS’s SCS provides federal (.gov) departments and agencies, state and local groups, fusion centers, and Information Sharing and Analysis Centers (ISACs) with access, at no cost, to commercial cyber threat feed subscriptions and platforms. Subscriptions include a variety of services, including access to Indicators of Compromise (IOC); threat actor techniques, tactics, and procedures (TTPs); and custom threat reports. The current SCS cyber threat intelligence vendors include: FireEye, InfoBlox, and LookingGlass.


 

Was this document helpful?  Yes  |  Somewhat  |  No