CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.
CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.
Rating
0.0 / 5.0
Pricing
Contact vendor
Deployment
SaaS / Cloud
Category
Security Operations
Product Description
CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.
The primary objective of the ISAC is to grow Australia's capability to respond to or resist cyber-attacks through the timely sharing of focussed intelligence, enabling members to proactively respond to cyber threats before they become incidents.
CI-ISAC operates as a Not for Profit (NFP) with membership fees directly invested in building intelligence-sharing capabilities and promoting member sharing. Central capabilities will be brought online to support members, with the aim of having multiple ‘turnkey’ capabilities available to assist resource-constrained members.
Contact Vendor
Interested in CI-ISAC Australia? Get in touch with the vendor.
arrow_upwardPOPULAR
ICT Misr
ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec
Abilene Advisors Supplier Shield
Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools
Analyst1 Orchestrated Threat Intelligence Platform
Analyst1 Orchestrated Threat Intelligence Platform on SecurityListing: Orchestrated threat intelligence platform for CTI and SOC teams
IGRC Square
IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a