Using industry-specific threat intelligence to detect and block threats is critical to preventing and reducing the risk of cyber threats. Today, we’re pleased to announce new integrations with the Electricity Information Sharing and Analysis Center (E-ISAC) and the Health Information Sharing and Analysis Center (H-ISAC). These integrations will enable mutual customers in the Energy and Healthcare industries to proactively block threats based on industry-specific threat intelligence. These integrations add to our growing collection of ISAC/ISAO integrations that also include the Financial Services Information Sharing and Analysis Center (FS-ISAC) and the Multi-State Information Sharing and Analysis Center (MS-ISAC).
Importance of Energy Industry Threat Intelligence
Using threat intelligence to combat cyber threats is increasingly critical. Threat intelligence improves your ability to prevent, detect, and respond to threats. The benefits are clear: prevent more threats and for the threats you can’t prevent, detect and respond to them faster before they do damage.
While there are lots of sources of threat intelligence, industry threat intelligence is a critical source. Threat actors commonly launch attacks targeting specific industries. Therefore, it’s vital to be aware of attacks and campaigns that are targeting your industry.
The great news is that accessing industry threat intelligence has never been easier as today, nearly every industry has its own industry sharing community. These communities are referred to as Information Sharing & Analysis Centers (ISACs) and or Information Sharing & Analysis Organizations (ISAOs). ISACs/ISAOs provide a great mechanism for organizations to share threat intelligence with industry peers and to gain visibility into specific threats targeting your industry.
Making Industry Threat Intelligence Actionable is Critical
While gaining visibility into industry-specific threats is important, as with threat intelligence in general, making it actionable is key. At Threater, that’s 100% of our focus.
When it comes to industry threat intelligence this means making it easy for ISAC/ISAO members to integrate this threat intelligence into our Threater Threat Intelligence Firewall platform and use it to block threats before they hit their network.
We do this by creating plugins that make it easy for ISAC/ISAO members to create automated IP and Domain Denied (Block) Lists in our platform. As you can see in the below images, ISAC/ISAO plugins are easily accessed via our Global Management Center (GMC) and creating an automated IP or Domain Denied List can be done in seconds!
Conclusion
Using and taking action with industry-specific threat intelligence is critical to cyber defense. At Threater, our strategy is to partner with threat intelligence providers and we’re pleased to add E-ISAC and H-ISAC to our growing roster of ISAC integrations.
If you are a Threater customer and there is an ISAC/ISAO you would like us to integrate with please let us know.
If you are an E-ISAC and H-ISAC member and want to learn more about the Threater Threat Intelligence Platform visit our website and The Threat Intelligence Challenges with Next Generation Firewalls whitepaper. We’re also happy to give you a free trial!