CI-ISAC is Australia’s only sovereign, not-for-profit cyber threat intelligence network built exclusively for critical infrastructure.
Our analysts monitor threats across all 11 critical infrastructure sectors simultaneously โ energy, health, finance, government, telecommunications and more โ and turn that raw data into clear, actionable advisories your team can act on immediately.
Members contribute what they’re seeing.
We analyse it and enrich it with intelligence from our own Australian honeypots and global sources.
We share it back across the entire network โ anonymously where needed.
The result is collective visibility that no single organisation, however well-resourced, can replicate alone.
CI-ISAC delivers three key benefits to help members improve their collective defences.
#1

Prioritise your security resources by focusing on mitigating the risks that matter most to your organisation
#2

Leverage threat intelligence to address the threats relevant to your organisation, freeing up internal resources
#3

Help strengthen the collective cyber defences of all Australian organisations, contributing to a resilient ecosystem.

Keep up to date with our latest thought leadership articles on the CI-ISAC blog.
The CI-ISAC leverages central resources and collective experience to support all members, regardless of maturity. This inclusive approach encourages all members to participate in cyber threat sharing.

Managed Threat Intelligence empowers members to effectively manage cyber risk.

Join trusted forums both within and across your industry sector to share best practices.

CI-ISAC partners with socially conscious organisations who are helping contribute
to the collective defences of our membership
Over 110 teams have already started working with us,
hear a selection of their member stories

Browse a selection of our recent media coverage.

CI-ISAC leverages membership fees to promote the collective uplift of all critical infrastructure defences, and as such members of all tiers gain access to the same core services and capabilities
You must be logged in to post a comment.