Features

Features

CTIIC Features

Drawing on lessons learned from the 2016 elections, the Intelligence Community (IC) created a Lexicon to better synchronize communications through the normalization of cyber terms used by the IC, election officials, and potentially the media. It provides a guide to cyber threat terms and related terminology issues likely to arise when describing cyber activity. The document includes a range of cyber-specific terms that may be required to accurately convey intelligence on a cyber threat event and terms that have been established by relevant authorities regarding technical infrastructure for conducting elections.

 

Download Cyber Threats to Elections: A Lexicon

Director Tonya Ugoretz at Senate Panel on North Korean Cyber Threat

 

CTIIC Director Tonya Ugoretz on 16 August joined officials from cyber security firms FireEye and Recorded Future as panelists at the Senate Cyber Security Caucus panel discussion on the North Korean cyber threat.

 

Aspen Instit Panel Discuss.fw

 

The Aspen Institute's Washington Ideas Roundtable Series on 31 October brought together CTIIC Director Tonya Ugoretz, senior DHS official Christopher Krebs—who oversees the Department's cyber and physical infrastructure security mission—and Deputy Assistant Attorney for National Asset Protection Adam Hickey for a conversation on Federal efforts overcome the cyber threat.

 

DoDiis

 

Lt. Gen. John Bansemer—ODNI's Assistant Director of National Intelligence Partner Engagement—spoke to attendees of the 13-16 August DoDIIS Worldwide Conference about how CTIIC supports federal  decisionmaking on cyber threats. Read the full article at CS4IRNET.

 

 

 

CTIIC is a small, multiagency center that works to increase the speed at which the US Government recognizes significant cyber activity is threatened or occurring so decisionmakers can act to prevent or minimize damage to US national interests. It is an integration point where analysts scrutinize fragments of cyber threat information produced by network defenders, Intelligence Community, law enforcement, incident responders, and non-Government sources; make connections; place the activity in context; call attention to significant activity; and work with partners to develop whole-of-government approaches to mitigate or counter the threat.


ODNI and the agencies that produce cyber threat intelligence designed CTIIC so that it supports, but does not duplicate, the work of other centers and agencies.


• CTIIC does not collect. It integrates and highlights information and expertise from around the community.
• It is not operational. CTIIC supports operators by ensuring they have the fullest possible threat picture and that parties with a range of tools and authorities are at the table when decisions are made.
• CTIIC has no direct liaison with the private sector. It works through agencies that do have those relationships and helps  downgrade information and analysis they can share.
• The Center does not advocate a “CTIIC view.” It produces community analysis on current threat issues by working with a wide set of experts (cyber, regional, technical, etc.) and by setting cyber activity in a broader context.

 

Cyber Threat Intelligence Integration Center