What is JCDC?
JCDC unifies public and private entities across the global cyber community in the collective defense of cyberspace. JCDC members gather, analyze, and share actionable cyber risk information to enable synchronized, holistic cybersecurity planning, cyber defense, and response.
What does JCDC do?
JCDC gathers, analyzes, and shares information about cyber threats, providing real-world value and proactive solutions to defend today and prepare for tomorrow. JCDC is a leader in integrated public-private sector cyber defense planning, cybersecurity information fusion, and dissemination of cyber defense guidance to reduce risk to critical infrastructure and National Critical Functions.
Read the 2023 JCDC Planning Agenda.
How is JCDC different from other public-private partnerships?
JCDC offers a more intimate and collaborative technical exchange among public and private stakeholders in critical infrastructure sectors and maintains a focus on actionable engagement and planning to mitigate risk in advance of cyber incidents.
Who comprises JCDC?
JCDC brings together experts from across the public and private sector. Industry partners include some of the nation’s most important cybersecurity companies and owners and operators across critical infrastructure. U.S. government partners are diverse and include the agencies designated by Congress when establishing this authority with CISA, including U.S. Cyber Command, the National Security Agency, the Federal Bureau of Investigation, the Department of Justice, the Office of the Director of National Intelligence, the U.S. Department of Defense, U.S. Secret Service, and the Department of Homeland Security.
How can I join JCDC?
JCDC isn’t an exclusive club. Currently, there is no official application for JCDC membership. JCDC admits members based on JCDC requirements as well as member availability, capability, and interest. It is free to join and obtain JCDC membership. Working with JCDC will look different for different organizations. For some, it might involve being part of a cyber defense planning effort focused on a specific risk scenario. For others, it might involve joining an operational collaboration challenge focused on a specific threat or vulnerability. And for others, it might involve participating in analyst-to-analyst exchanges. To join, email email@example.com.