Information Sharing and Analysis Centers were established to allow critical sectors to share information and work together in an effort to protect our critical infrastructures and minimize vulnerabilities.
Electricity Sector - serves as the primary security communications channel for the electricity sector and enhances the ability of the sector to prepare for and respond to cyber and physical threats, vulnerabilities and incidents.
Emergency Management and Response - support emergency responder health and safety and help fire departments prepare for and respond to fire, natural disasters, non-fire emergencies, and other threats and vulnerabilities.
Financial Services - forum for collaboration on critical security threats facing the global financial services sector
Multi-State - focal point for cyber threat prevention, protection, response and recovery for the nation's state, local, tribal, and territorial (SLTT) governments
Real Estate - Public-private partnership between U.S. real estate industry and the federal government to counter terrorism and protect buildings ant the people who occupy them.
Surface Transportation - Provides an electronic trusted ability for the membership to exchange and share information on cyber, physical, and all threats in order to defend critical infrastructure.
Telecommunications - monitors national and international incidents and events that may impact emergency communications. Incidents include not only acts of terrorism, but also natural events such as tornadoes, floods, hurricanes and earthquakes. In cases of emergency, NCC Watch leads emergency communications response and recovery efforts
Water - Inform drinking water and wastewater utility managers about potential risks to the nation's water infrastructure from contamination, terrorism and cyber threats and provide information to help utilities respond to and recover from all hazards.
National Council of ISACs - Members of the National Council of ISACs
ISAC Cyber Security for Business Managers: Training for Local Government
Part 1: Agenda
Part 2: Information Security
Part 3: Baseline Knowledge, People and Access Risks
Part 4: Baseline Knowledge Technology
Part 5: Threats 101 Review, Risk Assessment and Security Role Model