You are here

OK-ISAC Requirements

The OK-ISAC was created to assist the sharing of cyber threat intelligence among its members in order to increase cybersecurity readiness and response efforts in Oklahoma. These efforts include, but are not limited to, disseminating cyber threat intelligence, sharing security incident information between members, and distribution of industry recognized security practices.

Organizations requesting membership must be Oklahoma based or have direct relationships with Oklahoma Cyber Command. The individual requesting membership for their organization must be full-time staff having or sharing the principal responsibility for security protection and response at their organization. All individuals are required to have an email address associated with the member organization they are providing cybersecurity services for.

The OK-ISAC will be a community built on trust among members due to the sharing of sensitive information regarding cybersecurity threat, incidents, response, and protection. This established trust will allow members to safely share information without concern that the information will draw unwanted attention to their organization. Individuals participating in OK-ISAC are required to accurately represent themselves, reliably act in the interests of their organizations and promote a cybersecurity culture in Oklahoma.

Data Sharing Protocol.  All Data provided by the OK-ISAC or any Member shall include an information sharing designation in accordance with the US CERT Traffic Light Protocol (TLP), as set forth below. In the event that Data is shared and does not include a TLP designation, it shall be considered as having been designated TLP Red unless and until subsequently, the entity sharing the Data otherwise specifically changes the designation.