OK-ISAC
With the rise of cyber threats to Oklahoma, a practical approach was needed. To address that need, the Oklahoma Information Sharing and Analysis Center (OK-ISAC) was established as a multi-agency effort led and coordinated by the Office of Management and Enterprise Services (OMES). The main objective of this program is to mitigate cybersecurity risks across Oklahoma by providing real-time monitoring, vulnerability identification, incident response and threat intelligence to its members and partners.
OK-ISAC is committed to ensuring the State of Oklahoma and its citizens are continuously educated and prepared to conduct day-to-day cyber activities in a safe and secure manner. OK-ISAC will include members from Oklahoma organizations, business leaders, and cybersecurity professionals. The OK-ISAC will enhance information sharing across Oklahoma and improve cyber resilience at all levels of participation – local, regional and national.
Vision
Our vision for the OK-ISAC is to be a trusted hub for information-sharing and analysis on cybersecurity issues in the State of Oklahoma. This will be done by promoting an environment in which OK-ISAC members can work together to address those cybersecurity issues specific to the State of Oklahoma.
Mission
- To reduce the risk of cyber threats to the State of Oklahoma.
- To reduce the overall cost of cybersecurity for all state agencies by centralizing resources and providing a mechanism for leveraging large-scale purchases.
- To provide centralized services with highly specialized and skilled resources.
- To develop a cybersecurity ecosystem through public-private partnerships involving local entities, leading technology companies and other strategic private sector partners.
OK-ISAC Services and Capabilities
Provide members:
- A platform to encourage member-to-member collaboration.
- A secure online repository for sharing threat intelligence with members.
- Participation in conferences, workshops and tabletop exercises.
- Support efforts to develop cyber workforce by partnering with Higher Education.
- Develop and maintain relationships with industry partners.
- Supports members through implementing best practices and establishing a culture of cybersecurity and compliance.
Members
Our list of members continues to grow. The OK-ISAC is very proud to partner with all these organizations as we work to make Oklahoma more cyber secure.
Want to join this list of organizations and start benefiting from everything the OK-ISAC has to offer? Please request access.
Requirements
The OK-ISAC was created to assist the sharing of cyber threat intelligence among its members in order to increase cybersecurity readiness and response efforts in Oklahoma. These efforts include, but are not limited to, disseminating cyber threat intelligence, sharing security incident information between members, and distribution of industry recognized security practices.
Organizations requesting membership must be Oklahoma based or have direct relationships with Oklahoma Cyber Command. The individual requesting membership for their organization must be full-time staff having or sharing the principal responsibility for security protection and response at their organization. All individuals are required to have an email address associated with the member organization they are providing cybersecurity services for.
The OK-ISAC will be a community built on trust among members due to the sharing of sensitive information regarding cybersecurity threat, incidents, response, and protection. This established trust will allow members to safely share information without concern that the information will draw unwanted attention to their organization. Individuals participating in OK-ISAC are required to accurately represent themselves, reliably act in the interests of their organizations and promote a cybersecurity culture in Oklahoma.
Data Sharing Protocol. All data provided by the OK-ISAC or any Member shall include an information sharing designation in accordance with the US CERT Traffic Light Protocol (TLP), as set forth below. In the event that data is shared and does not include a TLP designation, it shall be considered as having been designated TLP Red unless and until subsequently, the entity sharing the data otherwise specifically changes the designation.
Request Access
The OK-ISAC has partnered with Anomali to help members leverage threat intelligence within their organizations. This relationship entitles all OK-ISAC members access to the Anomali ThreatStream platform, providing an easy way to access cyber threat intelligence provided by OMES Oklahoma Cyber Command.
Please visit the link below and complete the form to request approval from OK-ISAC for access to the ThreatStream platform.
Also, as a OK-ISAC member, you also have access to Anomali University, where you can access Instructional Videos and Self-Paced Training courses. To utilize this resource, please visit the link below to request an account. Please use Access code ALLAU16 to complete the registration.
In The News
Below is a collection of recent press releases highlighting the efforts of OMES Oklahoma Cyber Command and the OK-ISAC!
- Oklahoma Chooses Anomali to Build Statewide Threat Intelligence Program
- Oklahoma Launches Statewide Cyber Threat Sharing Platform
- Oklahoma Considers Adding Anti-Ransomware Laws Amid Growing Threats
- New Initiative Helps Oklahoma Fight Cyber Attacks
- Oklahoma CISO On Revamping the State's Defense Strategy
- State agency responding to growing cyber threats