Welcome to the VB2021 conference!

cyber threat alliance

The Cyber Threat Alliance (CTA) is a non-profit organization that is working to improve the cybersecurity of the global digital ecosystem by enabling near real-time, high-quality cyber threat information sharing among companies in the cybersecurity field.

We are proud to sponsor the VB2021 Threat Intelligence Practitioners’ Summit at VB2021

LEARN MORE ABOUT CTA BY VISITING OUR WEBSITE

button chat CHAT WITH US AT VB
2021 ON OUR DISCORD
CHANNEL
button membership INQUIRE ABOUT CTA MEMBERSHIP button mission LEARN ABOUT OUR MISSION button value FIND OUT HOW WE CREATE VALUE
FOR OUR MEMBERS
button newsletter WANT TO KEEP UP WITH
CTA? SIGN UP FOR OUR
QUARTERLY NEWSLETTER

“We share with fellow peers in our industry because it benefits everyone”

samir mody

Joe Chen, Engineering, Security Technologies and All Endpoint, Symantec, A Division of Broadcom

"The cybersecurity industry is built on trust, collaboration, and sharing. We see CTA as providing a unique platform to nurture those symbiotic relationships."

samir mody

Samir Moody, VP Threat Research, K7 Computing

“When someone shares with CTA, the understanding is that everyone can and will use it to make their products better for their customers."

samir mody

Ryan Olson, VP Threat Intelligence (Unit 42), Palo Alto Networks

"The only way to effectively fight back against such an evolving and well-resourced foe is for us to collaborate, to share what we know with each other and to recognize that if we work together, everyone will be much safer”

samir mody

Scott Lambert, VP of Threat Research, Reversing Labs

“CTA is the best collaborative platform out there in the private sector. I’ve been involved in other collaborative groups that have members in common with CTA and when those groups ask, “How do we improve?” people often say, “Be more like CTA.

samir mody

Imelda Flores, Head of SciLabs, Scitum (Cybersecurity Division of Telmex)

“The diversity of members focused on different aspects of cybersecurity and covering different parts of the world provides a more complete picture of the threat landscape than any one company could ever achieve on its own.”

samir mody

Derek Manky, Chief of Security Insights & Global Threat Alliances, FortiGuard Labs, Fortinet

"Data organization is the foundation upon which any threat intelligence program is built, and CTA gave us the roadmap to get there."

samir mody

Wade Woolwine, Principal Security Researcher, Rapid7

“Collaboration through CTA helps enable NTT to gather and process information and intelligence beyond that of our own reach and use that input to help improve our own intelligence as well as supported technologies and services.”

samir mody

Mark Thomas, Senior Threat Intelligence Director, NTT Ltd.

“Together, we need to improve our approach, share threat intelligence more comprehensively and expand the pool of participants who contribute to (and benefit from) this sharing and collaboration. This is how cybersecurity vendors will make lasting, impactf"

samir mody

Joe Levy, CTO, Sophos

“CTA enables us to utilize some of the shared IOCs automatically, and we use that in our various detection engines, for example, IPs and domains in threat feeds, helping us to better protect all networks from potential threats.”

samir mody

Mounir Hahad, Head of Juniper Labs, Juniper Networks

FIVE PRINCIPLES OF CTA

FOR THE GREATER GOOD

We protect customers, strengthen critical infrastructure, and defend the digital ecosystem.

TIME IS OF THE ESSENCE

We prevent, identify, and disrupt malicious activity by rapidly sharing timely, actionable intelligence.

CONTEXT RULES

We reward context sharing to identify an indicator and provide useful information about it.

RADICAL TRANSPARENCY

We attribute intelligence to the member who submits it, but anonymize any and all victim and sensitive data.

YOU MUST GIVE TO RECIEVE

We require all members to share a minimum amount of intelligence with the alliance to prevent the free-rider problem.

MEMBERSHIP CRITERIA

All potential members undergo a thorough vetting process with our Membership Committee to confirm eligibility and ensure that CTA membership is mutually beneficial.

Prospective members must meet the 4 baseline criteria below. Potential value to CTA and any potential security risks are also considered.

(1) All members must be eligible to conduct business in the United States

(2) All members must have cyber threat intelligence to submit to CTA

(3) All members must maintain the technical capability to share and receive threat intelligence to / from CTA

(4) All members must not have undue influence from government affiliations, other than customer relationships, that are contrary to CTA’s purpose

our members

PARTNER WITH US

As part of our mission to elevate cybersecurity across the digital ecosystem, CTA partners with organizations from academia, non-profits, and governmental institutions that are ineligible for membership. CTA has established a diverse range of flexible partnerships to allow productive relationships with non-members to be undertaken.

Learn more about CTA Partnerships.

our partners