• Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Call us! 210-458-2119

CIAS@UTSA.edu
CIAS ISAOCIAS ISAO
  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

BRINGING CYBERSECURITY Promoting. Establishing. And Encouraging. TO COMMUNITIES Find out more The Community Cyber Security Maturity Model Using the CCSMM, your community will be able to build a viable and sustainable cybersecurity program in your community. Learn more.

Awareness

The CIAS-ISAO educates communities about the extent of cyber threats, the current attack trends, how a cyber incident can impact a community, what vulnerabilities should be addressed, and their cascading effects when under a cyber attack.

Information Sharing

The CIAS-ISAO encourages discussion on cyber incidents and where the information should be reported; and understanding how one sector can share information with another to potentially prevent an incident from occurring.

Policy

Policies address the need to integrate cyber elements into the policies or guiding principles for not only organizations but also jurisdictions. We assist organizations in incorporating the NIST Cyber Security Framework into community programs.

Plan

Addressing many different hazards, we work to ensure community plans identify how cyber incidents can impact the whole community and identify the cascading effects a cyber incident may cause.

Daily No. of Ransomware Attacks Worldwide

Average No. of Daily Internet Attacks

Percent of Malware Attacks (2019) Targeting Small Businesses

Websites hacked daily

Member Discount on CCSMM Book

“Establishing Cyber Security Programs through the Community Cyber Security Maturity Model (CCSMM)” is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation. The book can be purchased on igi-global.com.

However, the CCSMM book is 50% OFF to Level 2 & 3 members! Contact the CIAS-ISAO for your discount code.

The CIAS ISAO will help your Community

in the following six areas to help create
your customized community cybersecurity program.

Public/Private Partnerships

Enhance public/private cybersecurity partnerships at all levels of government, industry and academia.

Community Roadmap

Provide a roadmap to develop the community’s security program to include incorporating the NIST Cyber Security Framework

Sustainable Program

Establish a viable and sustainable community cybersecurity program based upon the Community Cyber Security Maturity Model (CCSMM)

Conduct Assessments

Conduct assessments to validate and enhance cybersecurity incident response, cybersecurity processes and plans.

Trust

Create a trusted, community environment.

Establish Your Community ISAO

Establish a Community Information Sharing and Analysis Organization (ISAO), based upon the guidelines established by the ISAO Standards Organization (ISAO SO)

I'm in. Make me a member!

What makes us unique?

The CCSMM

We work with geographically-based communities to establish a comprehensive cybersecurity program by using the congressional-supported Community Cyber Security Maturity Model (CCSMM).

 

Our Approach

We recognize that all organizations within the community are not prepared equally to defend against this threat and a targeted attack could affect the entire community, and our approach is to assist geographically-based communities .

 

General Advice

The Crucial Function of Cybersecurity Policies in Organizations

The importance of cybersecurity cannot be emphasized enough in today's connected society. Digital technology is at the core of every part of our lives; therefore, organizations must construct their defenses against cyber-attacks using cybersecurity policies as the framework. In this post, we will go into what typically makes up a security policy, as well as how to distinguish between control objectives, standards, guidelines and procedures. We will also look at why cybersecurity policies are so essential.

General Advice

A Roadmap to Developing Your Community Cybersecurity Program

To help you get started in developing your community's cybersecurity program, the CIAS-ISAO has four initial, critical steps to guide you. Each step includes specific ways to help you accomplish them.

General Advice, Uncategorized

Collaboration and Consensus: Using the MITRE ATT&CK Framework

The MITRE ATT&CK framework is one of today's most significant and publicly available cybersecurity knowledge bases. Organizations, cybersecurity analysts and practitioners should use MITRE ATT&CK because it fosters greater awareness of the security posture by gaps in defenses. More importantly, the ATT&CK lists methods to mitigate or interrupt attacker attempts to perform the specific technique. Moreover, the framework is designed to be used at all levels of the organization, from analysts to leaders. This article highlights the framework's tactics with examples of how to share information within your organization.

News

Introducing Alan CyBear, the Smokey of Cybersecurity

The cultural icon Smokey Bear, with his yellow hat and wildfire prevention tagline, has been familiar to Americans for decades. Likewise, McGruff the Crime Dog, who encouraged the public to “Take a bite out of crime.” These famous characters has helped encourage a culture of security. But what about a culture of cybersecurity? Since cybersecurity is a shared responsibility, the UTSA Center for Infrastructure Assurance and Security (CIAS) has launched Alan CyBear™, a new mascot to promote a more secure nation through cybersecurity awareness, prevention and defensive efforts.

General Advice

Think like a Hacker, a Defense Strategy

A good defense requires that IT security professionals think like an attacker to defend their organizations tactically and preemptively. In general, security professionals need to develop "oblique thinking," enabling an adversarial mindset that focuses on identifying assumptions and determining if and how these assumptions can be violated. This article focuses focus on the (1) reconnaissance, (2) scanning (3) and gaining access phases of hacking and how to defend against them.

General Advice

Engaging your Leadership in Cybersecurity

Over the years, the security industry has been encouraging the highest levels of leadership to become more involved and knowledgeable in cybersecurity. Organizational leaders that need to be aware of cybersecurity are at all levels. Leaders can be the CEO, the board of directors, the school superintendent, a department head or a team lead. These leaders do not focus on the cybersecurity day-to-day details, but they do have unique roles in helping their organizations manage cybersecurity threats. Now is a great time to work with the leaders in your organization to be more cyber-knowledgeable and cyber-prepared.

General Advice, Uncategorized

Incident Response – Lessons to be Better Prepared

Incident response addresses the question: “How well did you prepare?” Your response to that question is directly related to your preparation. This supports the adage that an ounce of prevention is worth a pound of cure—or response. This article takes a look at five basic lessons to consider when mitigating incidents to help you prepare and prevent a potential cyber incident.

News

Incident Response Plans (Webinar)

Incident Response Plans are critical to an organization’s ability to minimize damage caused by threats,…

General Advice

A Whole-Community Cybersecurity Program

A community with an established cybersecurity program and established information sharing processes will be much more likely to be able to effectively respond to cyber events impacting them. This article introduces the topic of whole-community cybersecurity programs and five key reasons why they are needed.

News

An Introduction to the CISA Reporting System (Webinar)

Register for a one-hour webinar on October 26th with the CIAS-ISAO Associate Director of Technology and Research Dwayne Williams, as he provides insights into no-cost tools that can help you monitor and secure your organization’s IT infrastructure.

© 2026 UTSA Center for Infrastructure Assurance & Security -- CIAS-ISAO powered by

  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website