cyber threat alliance

The Cyber Threat Alliance (CTA) is a non-profit organization that is working to improve the cybersecurity of the global digital ecosystem by enabling near real-time, high-quality cyber threat information sharing among companies in the cybersecurity field.

We are proud to sponsor the VB2020 Threat Intelligence Practitioners’ Summit at VB2020

LEARN MORE ABOUT CTA BY VISITING OUR WEBSITE

button chat CHAT WITH US AT VB 2020
ON OUR DISCORD CHANNEL
button membership INQUIRE ABOUT
CTA MEMBERSHIP
button mission LEARN ABOUT OUR MISSION button value FIND OUT HOW WE CREATE VALUE FOR OUR MEMBERS button newsletter WANT TO KEEP UP WITH
CTA? SIGN UP FOR OUR QUARTERLY NEWSLETTER
samir mody

“The cybersecurity industry is built in trust, collaboration, and sharing. We see CTA as providing a unique platform to nurture those symbiotic relationships.”

— Samir Mody, VP Threat Research, K7 Computing

ryan olson

“When someone shares with CTA, the understanding is that everyone can and will use it to make their products better for their customers.”

— Ryan Olson, VP Threat Intelligence (Unit 42), Palo Alto Networks

joe chen

“We share with fellow peers in our industry because it benefits everyone.”

— Joe Chen, Engineering, Security Technologies & All Endpoint Solutions, Broadcom Inc.

wade woolwine

“Data organization is the foundation upon which any threat intelligence program is built, and CTA gave us the roadmap to get there.”

— Wade Woolwine, Principal Security Researcher, Rapid7

jeremy nichols

“Cyber Threat Alliance membership has allowed the NTT Global Threat Intelligence Center to continue to mature our research, threat hunting and intelligence dissemination processes through automated and manual intelligence sharing between members.”

— Jeremy Nichols, Director, Intelligence Fusion & Analytics, NTT

FIVE PRINCIPLES OF CTA

FOR THE GREATER GOOD

We protect customers, strengthen critical infrastructure, and defend the digital ecosystem.

TIME IS OF THE ESSENCE

We prevent, identify, and disrupt malicious activity by rapidly sharing timely, actionable intelligence.

CONTEXT RULES

We reward context sharing to identify an indicator and provide useful information about it.

RADICAL TRANSPARENCY

We attribute intelligence to the member who submits it, but anonymize any and all victim and sensitive data.

YOU MUST GIVE TO RECIEVE

We require all members to share a minimum amount of intelligence with the alliance to prevent the free-rider problem.

MEMBERSHIP CRITERIA

All potential members undergo a thorough vetting process with our Membership Committee to confirm eligibility and ensure that CTA membership is mutually beneficial.

Prospective members must meet the 4 baseline criteria below. Potential value to CTA and any potential security risks are also considered.

(1) All members must be eligible to conduct business in the United States

(2) All members must have cyber threat intelligence to submit to CTA

(3) All members must maintain the technical capability to share and receive threat intelligence to / from CTA

(4) All members must not have undue influence from government affiliations, other than customer relationships, that are contrary to CTA’s purpose

our members

PARTNER WITH US

As part of our mission to elevate cybersecurity across the digital ecosystem, CTA partners with organizations from academia, non-profits, and governmental institutions that are ineligible for membership. CTA has established a diverse range of flexible partnerships to allow productive relationships with non-members to be undertaken.

Learn more about CTA Partnerships.

our partners