skip to Main Content

FB-ISAO’s Local Information Sharing Communities

Information Sharing Organizations are driven by the members – the organization itself simply provides the venue for members to collaborate in a way that works best for their respective communities. Since its inception, the Faith-Based Information Sharing & Analysis Organization…

Read more

A Message to the Community of Faith, from the DHS Assistant Director of Infrastructure Security

"The ongoing coronavirus (COVID-19) pandemic has temporarily altered our daily activities. People are rightly practicing social distancing to limit community spread, in line with the President’s Coronavirus Guidelines for America. Many houses of worship have also suspended or significantly reduced services to avoid mass gatherings. Although many people undoubtedly continue to practice their faith, including through remote services and prayer, most are inevitably eager to return to normalcy and join their fellow congregants in practicing their faiths. The American people are resilient, and we will achieve this goal soon."
Read more

FB-ISAO Raises Physical Threat Level to “CRITICAL,” Maintains Cyber Threat Level at “ELEVATED”

The TIG has determined to increase the Physical Threat Level from “SEVERE,” to “CRITICAL,” – our highest level of threat - as of 31 March 2020. The TIG will continue to assess the Physical Threat Level and provide updates accordingly. At present, this increase is valid through sunset on 30 April 2020, but that will be periodically re-evaluated. The TIG has determined to maintain the Cyber Threat Level at “ELEVATED,” as it has been since 20 March 2020. The TIG will continue to assess the Cyber Threat Level and provide updates accordingly. At present, this increase is valid through sunset on 30 April 2020, but that will be periodically re-evaluated.
Read more

Associated Risks: A Perhaps Not-So-Obvious Threat

Associated risks are potential unwanted outcomes resulting from an incident, event, or occurrence in nearby proximity, that may not be connected to the specific organization or location. In many instances, the associated risk stems from the impact of threats against people, places or event that are actually the intended target
Read more

Hostile Events Attack Cycle – Intense Surveillance

Once a target is selected, the attacker will resolve outstanding questions about the target environment, expand collection efforts through surveillance, and seek to adequately address remaining unknowns in order to ensure their attack is as successful as possible.
Read more
Back To Top
Show Buttons
Hide Buttons