Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

 
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium Businesses
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
    Work @ CISA
  • About
    Culture
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Contact Us
    Site Links
    CISA Administrative Subpoena
    Reporting Employee and Contractor Misconduct
    CISA GitHub
    Signature Verification
    Subpoena Process
Report a Cyber Issue
Breadcrumb
  1. Home
  2. Topics
  3. Cyber Threats and Advisories
Share:
Abstract cyber image

Information Sharing

Information sharing is the key to preventing a wide-spread cyber-attack. CISA develops partnerships to rapidly share critical information about cyber incidents.

Cyber Threats and Advisories

  • Malware, Phishing, and Ransomware
  • Incident Detection, Response, and Prevention
  • Information Sharing
  • Securing Networks
  • Advanced Persistent Threats

Overview

Information sharing is essential to furthering cybersecurity for the nation. Isolating cyber attacks and preventing them in the future requires the coordination of many groups and organizations. By rapidly sharing critical information about attacks and vulnerabilities, the scope and magnitude of cyber events can be greatly decreased. With the right plans, processes, and connections in place, information sharing can be seamless step of incident response procedures and a first defense against wide-spread cyber attacks.

CISA’s Role

As the lead federal department for the protection of critical infrastructure and the furthering of cybersecurity, CISA has developed and implemented numerous information sharing programs. Through these programs, CISA develops partnerships and shares substantive information with the private sector. CISA also shares information with state, local, tribal, and territorial governments and with international partners, as cybersecurity threat actors are not constrained by geographic boundaries.

Featured Content and Programs

Automated Indicator Sharing (AIS)

AIS enables real-time exchange of machine-readable cyber threat indicators and defensive measures to protect AIS participants and reduce the prevalence of cyberattacks.

Cyber Information Sharing and Collaboration Program (CISCP)

The Cyber Information Sharing and Collaboration Program (CISCP) enables actionable, relevant, and timely unclassified information exchange through trusted public-private partnerships across all critical infrastructure (CI) sectors. 

Joint Cyber Defense Collaborative (JCDC)

CISA established the Joint Cyber Defense Collaborative (JCDC) to unify cyber defenders worldwide. The team proactively gathers, analyzes, and shares actionable cyber risk info to enable synchronized, holistic cyber planning, defense, and response. 

Coordinated Vulnerability Disclosure Process

CISA's CVD program coordinates the remediation and public disclosure of newly identified cybersecurity vulnerabilities in products and services with the affected vendor(s). 

Information Sharing and Analysis Organizations (ISAOs)

Information on past ISAO meetings, future engagements, published Federal Register Notices, public comments, and other engagement materials.

Enhanced Cybersecurity Services

Enhanced Cybersecurity Services (ECS) is a voluntary information sharing program that assists owners and operators of critical infrastructure in enhancing the protection of their systems from unauthorized access, exploitation, or data exfiltration.

Information Sharing Training

CISA offers a variety of trainings to help implement information sharing practices and benefit from their practical applications.

View All Cybersecurity Trainings

Professors in Practice - Session 2: Cyber Threat Intelligence: Practical Applications and Impact of Information Sharing

AUG 12, 2022 | SEMINAR/WORKSHOP | VIRTUAL/ONLINE
Dr. JD Work will discuss current cyber intelligence communities, how they operate and share information, and how they are evolving and shifting operations to meet new and future demands.
View All Cybersecurity Trainings

Information Sharing Services

CISA provides services that connect you with a community dedicated to enhancing cybersecurity through information sharing.

View More Services

Shared Cybersecurity Services (SCS)

Shared Cybersecurity Services (SCS) is a portfolio of CISA-funded contracts that provides federal civilian agencies, state fusion centers, and select information sharing and analysis centers with no-cost access to commercial Cyber Threat Intelligence (CTI) and services.
View More Services

Information Sharing Resources and Publications

CISA offers guidance, tools, and resources to help understand how information sharing helps secure the nation's cybersecurity. 

View All Information Sharing Resources

Cybersecurity Information Sharing Act of 2015

As mandated by the Cybersecurity Information Sharing Act of 2015, the Department certified the operability of AIS in March 2016 and released guidance to help non-federal entities share cyber threat indicators with the Federal Government.

AIS Fact Sheet

CISA’s' free Automated Indicator Sharing (AIS) program enables organizations to share and receive machine-readable cyber threat indicators and defensive measures in real time to monitor and defend their networks against relevant known threats.

National Information Exchange Model (NIEM) Cyber Domain

NIEM is a common vocabulary that enables efficient information exchange across diverse public and private organizations. NIEM can save time and money by providing consistent, reusable data terms and definitions, and repeatable processes.

View All Information Sharing Resources

Share Indicators and Defense Measures

Submit cyber threat indicators and defensive measures with DHS and the Federal Government (includes sharing under the Cybersecurity Information Sharing Act of 2015).

Submit Indicators
Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 888-282-0870 Central@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Accessibility
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • The White House
  • USA.gov
  • Website Feedback