• Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Call us! 210-458-2119

CIAS@UTSA.edu
Login

Register

Login
CIAS ISAOCIAS ISAO
  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

ISAO-300-2: Automated Cyber Threat Intelligence Sharing

Home ISAO-300-2: Automated Cyber Threat Intelligence Sharing

ISAO-300-2

Automated Cyber Threat Intelligence Sharing

View or Download
  • Revision 1.0
  • April 7, 2021
  • ISAO-300-2
Leave a Comment

Comprised of technical discussions and guidelines to assist organizations implementing automated cyber threat intelligence information sharing and its use in mitigating cybersecurity risks, the ISAO 300-2 document is designed to provide an implementation guideline for automating key elements of the cyber threat intelligence life cycle.

“This document, written and supported by volunteers within the ISAO community, supports the decision-making and actions taken by the information sharing ecosystem to manage cybersecurity risks to their organizations,” said Dr. Greg White, executive director of the ISAO SO.

The ISAO 300-2 document is targeted at organizations wanting to automate and use cyber threat intelligence processes for defending their enterprise. This document is also useful for any Information Sharing and Analysis Organization (ISAO) members and organizations that are participating or considering participating in automated sharing efforts.

The document highlights areas that include, but are not limited to, the information life cycle, structured and unstructured data as it relates to automation, different types of automation, the cyber threat intelligence ecosystem, stakeholder engagement and how to design an automated process.

Published by ISAO.org The ISAO Standards Organization, led by the Center for Infrastructure Assurance and Security (CIAS), has published initial voluntary guidelines for use and implementation by emerging and established ISAOs. These publications have been developed in response to Presidential Executive Order 13691 to provide guidelines for robust and effective information sharing and analysis related to cybersecurity risks, incidents and best practices.

The documents have been developed through an open, transparent consensus-based process and represent the collaboration of over 160 experts from industry, government and academia, combined with the input and feedback of the public. The ISAO document series continues to grow and evolve to serve the community with additional publications. If you have any comments or suggestions relating to these documents, click “Leave a Comment”.

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message

Contact Info

  • CIAS-ISAO
  • One UTSA Circle, San Antonio, TX 78249
  • 210-458-2119
  • cias@utsa.edu
  • https://ciasisao.org

© 2025 UTSA Center for Infrastructure Assurance & Security

  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website