Threat Intelligence Sharing & Collaboration
Explore how government agencies can streamline ISAC operations and enhance intelligence sharing through the powerful capabilities of OpenCTI and OpenBAS.

How are modern ISACs and ISAOs evolving to meet today’s cyber challenges? Explore how government agencies can streamline ISAC operations and enhance intelligence sharing through the powerful capabilities of OpenCTI and OpenBAS.
What we covered in this session:
🔹 Platform Architectures: Explore the pros and cons of different ISAC Threat Intelligence Platform architectures powered by OpenCTI.
🔹 Operational Excellence: Gain best practices and practical how-tos for streamlining ISAC analyst workflows.
🔹 Enhanced Collaboration: Discover innovative dissemination techniques and collaboration strategies with ISAC members.
Watch now
Discover other resources
Architecting OpenCTI for Classified Airgapped Environments
Delve into best practices for deploying threat intelligence platforms in highly secure, air-gapped settings, ensuring robust multi-level security and operational efficiency.
Operationalizing Threat Intelligence for National Security
How threat intelligence helps government agencies stay ahead of evolving cyber threats and protect critical infrastructure
OpenCTI for disinformation
In this video, explore how to utilize OpenCTI to classify and investigate disinformation.