User:BD2412/Undrafted/Integrated Intelligence Center

The Integrated Intelligence Center (IIC) is a program in the United States "ensuring that actionable information pertaining to cyber security is disseminated and shared with fusion centers in a timely fashion".[1] The IIC aids in the sharing of intelligence products and information between government and private sector entities. State, local, tribal, and territorial (SLTT) government partners use the IIC as a resource to report and collaborate with each other on cybersecurity issues in as timely a manner as possible. In order for the United States Department of Homeland Security and the IIC to collect, analyze, and "ensure actionable information" [2] with their SLTT partners, they offer fusion centers, homeland security advisors, and law enforcement entities equipped with cybersecurity products to the companies they work with. In order to protect the online safety of these organizations, the IIC facilitates secure, "two-way sharing of information between and among similarly situated partners".[2] This sharing is pertinent to this industry because the industry is so heavily based on collaboration at all levels.

In addition to two-way sharing, the IIC provides its clients many other resources. Intelligence sharing allows SLTT governments to notify each other of cyber security "threats, trends, and problems" that they experience. Subject matter experts analyze cyber trends and intelligence in order to assist SLTT governments in both on-going ventures and "one-time events and assessments". Given by expert lecturers, monthly training sessions on evading cyber crime are provided to "fusion center analysts and other interested partners". Through these resources, the Integrated Intelligence Center aims to improve both the safety and awareness of cyber issues, as well as prepare its clients to quickly respond to and resolve cyber threats.[3]

References

edit
  1. ^ Robert M. Clark and Simon Hakim, "Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security", Cyber-Physical Security (August 11, 2016), p. 1-17.
  2. ^ a b "Center for Internet Security". Center for Internet Security. Retrieved July 25, 2017.
  3. ^ Mavretich, R. (October 18, 2012). "Using the Center for Internet Security (CIS) Benchmarks to support an Information Security Management System". SANS Institute. Retrieved March 12, 2014.
This open draft remains in progress as of February 15, 2022.