{"id":1653,"date":"2023-11-25T22:25:25","date_gmt":"2023-11-25T22:25:25","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=1653"},"modified":"2024-05-24T11:10:50","modified_gmt":"2024-05-24T11:10:50","slug":"a-pilot-program-for-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/","title":{"rendered":"A Pilot Program for Critical Infrastructure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1653\" class=\"elementor elementor-1653\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eeb4265 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eeb4265\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<article class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44ff717\" data-id=\"44ff717\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-fb3ed7b e-flex e-con-boxed e-con e-parent\" data-id=\"fb3ed7b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<article class=\"elementor-element elementor-element-ad8ac92 e-con-full e-flex e-con e-child\" data-id=\"ad8ac92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2541662 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2541662\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b3618d3\" data-id=\"b3618d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-94cac2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"94cac2a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fc68dc2\" data-id=\"fc68dc2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83b97a8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"83b97a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The U.S. Cybersecurity and Infrastructure Security Agency&#8217;s (CISA) announcement of a pilot program to deliver cybersecurity shared services to critical infrastructure entities is a significant development in bolstering national cybersecurity resilience. This initiative, leveraging CISA&#8217;s expertise as a managed service provider, aims to extend robust cybersecurity support to non-federal organizations, particularly those most in need.<\/p><p>Owner\/operators of the 16 critical infrastructure categories are eligible for the program. In summary the program aims to accomplish the following:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3eb8a7 elementor-widget elementor-widget-image\" data-id=\"d3eb8a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"250\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage-300x250.png\" class=\"attachment-medium size-medium wp-image-1659 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage-300x250.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage-768x640.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage.png 975w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><noscript><img decoding=\"async\" width=\"300\" height=\"250\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage-300x250.png\" class=\"attachment-medium size-medium wp-image-1659 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage-300x250.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage-768x640.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/EndingImage.png 975w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1b3d7c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b3d7c7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-27b6488\" data-id=\"27b6488\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39bcbcf elementor-widget elementor-widget-text-editor\" data-id=\"39bcbcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Streamlines and Harmonizes Cyber Incident Reporting<\/strong>: The recommendations aim to simplify and unify the process of reporting cyber incidents. This includes establishing clear definitions, timelines, and triggers for reportable cyber incidents, and creating a standard reporting form for federal agencies. This effort is geared towards reducing the burden on critical infrastructure partners and enhancing the federal government&#8217;s ability to identify trends in malicious cyber activities.<\/li><li><strong>Provides Clarity and Consistency in Information-Sharing<\/strong>: The guidelines stress the importance of clear, consistent guidelines for information-sharing in the aftermath of a cyber-attack. This is crucial for private sector partners to effectively mitigate the impacts of such incidents. The clarity provided by these guidelines is expected to improve understanding of the cyber threat landscape, assist in recovery from disruptions, and help prevent future attacks.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d1f41e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0d1f41e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50c7dfa\" data-id=\"50c7dfa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a50892 elementor-widget elementor-widget-text-editor\" data-id=\"9a50892\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol start=\"3\"><li><strong>Establishes a Framework for Collaborative Development<\/strong> <strong>Among and Between Federal Agencies<\/strong>: The recommendations were developed in collaboration with the Cyber Incident Reporting Council (CIRC), involving over 50 different federal cyber incident reporting requirements. This extensive analysis and engagement with various industry and private sector stakeholders underscore the comprehensive and collaborative approach taken in formulating these recommendations.<\/li><li><strong>Balances Information Needs with Industry Burdens<\/strong>: Recognizing the critical role of reporting in cybersecurity, the guidance also acknowledges the need to balance information requirements with the burdens placed on the industry. This balance is aimed at ensuring that the reporting requirements are as efficient and non-redundant as possible.<\/li><li><strong>Provides for Wide Representation in the CIRC<\/strong>: The CIRC includes representation from 33 federal agencies, indicating the broad scope and inter-agency collaboration in addressing cyber incident reporting. This wide representation ensures a diverse range of perspectives and expertise in developing effective cybersecurity strategies.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f00312 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f00312\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-97f64ed\" data-id=\"97f64ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1cc5a38 elementor-widget elementor-widget-image\" data-id=\"1cc5a38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"99\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-1024x158.png\" class=\"attachment-large size-large wp-image-1672 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-1024x158.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-300x46.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-768x118.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-1536x236.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner.png 1598w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"99\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-1024x158.png\" class=\"attachment-large size-large wp-image-1672 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-1024x158.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-300x46.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-768x118.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner-1536x236.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/TopBanner.png 1598w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c101f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c101f5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ee5c50\" data-id=\"6ee5c50\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46affc1 elementor-widget elementor-widget-text-editor\" data-id=\"46affc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Key implementation features of the pilot program include:<\/p><ul><li><em>Expanded Reach of CISA Services<\/em>: The pilot program seeks to scale CISA-managed cybersecurity services to critical infrastructure segments, offering cost-effective solutions for better insight into threats and establishing a common baseline of cyber protection.<\/li><li><em>Focus on Vulnerable Sectors<\/em>: Initial deployment targets sectors like healthcare, water, and K-12 education, reflecting CISA\u2019s &#8216;Target Rich, Resource Poor&#8217; strategy.<\/li><li><em>Shared Cybersecurity Services Portfolio<\/em>: This offers access to commercial cyber threat intelligence and services, enhancing the capabilities of federal and selected non-federal entities.<\/li><li><em>Engagement and Customization<\/em>: CISA is conducting roundtables and information sessions with critical infrastructure partners across all regions and sectors to tailor services to their unique needs and challenges.<\/li><li><em>Introduction of Protective DNS Resolver<\/em>: Initially available to federal agencies, this service, now extended to pilot participants, uses threat intelligence to prevent connections to malicious domains, significantly reducing common cyber risks.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-be9a3d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be9a3d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-86d51ca\" data-id=\"86d51ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0a45285 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a45285\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3690293\" data-id=\"3690293\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42d1004 elementor-widget elementor-widget-image\" data-id=\"42d1004\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"703\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing.png\" class=\"attachment-large size-large wp-image-1673 lazyload\" alt=\"Inside data center\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing.png 786w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing-273x300.png 273w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing-768x843.png 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"703\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing.png\" class=\"attachment-large size-large wp-image-1673 lazyload\" alt=\"Inside data center\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing.png 786w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing-273x300.png 273w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DataWarehousing-768x843.png 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-7027c6c\" data-id=\"7027c6c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-177a474 elementor-widget elementor-widget-text-editor\" data-id=\"177a474\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>\u00a0<\/div><ul><li><em>Insight Gathering and Strategy Development<\/em>: Insights from the pilot and discussions with infrastructure entities will inform CISA\u2019s strategies to better serve national critical infrastructure organizations.<\/li><li><em>Response to Escalating Cyber Threats<\/em>: The program is a response to the increasing frequency and severity of cyber-attacks on critical infrastructure, exemplified by incidents like the Colonial Pipeline attack and threats from sophisticated hacker groups.<\/li><li><em>Resource Accessibility<\/em>: CISA has published resources like the Security Planning Workbook to aid critical infrastructure asset owners and operators in their security planning, making cybersecurity more accessible to a wider audience.<\/li><li><em>Collaborative Efforts Against Emerging Threats<\/em>: Recent joint advisories between CISA, DOD and the FBI demonstrate the collaborative efforts of U.S. federal government agencies with advanced cybersecurity expertise in addressing new and rapidly evolving cyber threats.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29b9d00 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29b9d00\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0373c55\" data-id=\"0373c55\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d7953a elementor-widget elementor-widget-text-editor\" data-id=\"2d7953a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Overall, this initiative represents a proactive and collaborative approach to enhancing the cybersecurity posture of critical infrastructure sectors, addressing the growing complexity and impact of cyber threats in the modern landscape.<\/p><p>In summary, the CISA guidance supporting this pilot program represents a significant step in enhancing the resilience and security of critical infrastructure against cyber threats. By providing clear reporting guidelines, fostering collaborative development, and balancing industry needs, the guidance aims to improve the nation&#8217;s overall cybersecurity posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-3d92a8b e-flex e-con-boxed e-con e-parent\" data-id=\"3d92a8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in.  This is important because the tools, networks and end points are highly specialized.  <\/p>\n","protected":false},"author":2,"featured_media":1654,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[2,316,27],"tags":[1895,214],"class_list":["post-1653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coth","category-infrastructure","category-policy","tag-cisa","tag-critical-infrastructure"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"A Pilot Program for Critical Infrastructure - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-11-25T22:25:25+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-05-24T11:10:50+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"A Pilot Program for Critical Infrastructure - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#blogposting\",\"name\":\"A Pilot Program for Critical Infrastructure - CTIN\",\"headline\":\"A Pilot Program for Critical Infrastructure\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/LightAtEnd.jpg\",\"width\":1200,\"height\":697,\"caption\":\"Shining light at the end of the tunnel\"},\"datePublished\":\"2023-11-25T22:25:25+00:00\",\"dateModified\":\"2024-05-24T11:10:50+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#webpage\"},\"articleSection\":\"COTH, Infrastructure, Policy, CISA, critical infrastructure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"position\":4,\"name\":\"Policy\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#listItem\",\"name\":\"A Pilot Program for Critical Infrastructure\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#listItem\",\"position\":5,\"name\":\"A Pilot Program for Critical Infrastructure\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/\",\"name\":\"A Pilot Program for Critical Infrastructure - CTIN\",\"description\":\"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/LightAtEnd.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#mainImage\",\"width\":1200,\"height\":697,\"caption\":\"Shining light at the end of the tunnel\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/25\\\/a-pilot-program-for-critical-infrastructure\\\/#mainImage\"},\"datePublished\":\"2023-11-25T22:25:25+00:00\",\"dateModified\":\"2024-05-24T11:10:50+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>A Pilot Program for Critical Infrastructure - CTIN<\/title>\n\n","aioseo_head_json":{"title":"A Pilot Program for Critical Infrastructure - CTIN","description":"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#blogposting","name":"A Pilot Program for Critical Infrastructure - CTIN","headline":"A Pilot Program for Critical Infrastructure","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/LightAtEnd.jpg","width":1200,"height":697,"caption":"Shining light at the end of the tunnel"},"datePublished":"2023-11-25T22:25:25+00:00","dateModified":"2024-05-24T11:10:50+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#webpage"},"articleSection":"COTH, Infrastructure, Policy, CISA, critical infrastructure"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","position":4,"name":"Policy","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#listItem","name":"A Pilot Program for Critical Infrastructure"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#listItem","position":5,"name":"A Pilot Program for Critical Infrastructure","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/","name":"A Pilot Program for Critical Infrastructure - CTIN","description":"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/LightAtEnd.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#mainImage","width":1200,"height":697,"caption":"Shining light at the end of the tunnel"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/#mainImage"},"datePublished":"2023-11-25T22:25:25+00:00","dateModified":"2024-05-24T11:10:50+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"A Pilot Program for Critical Infrastructure - CTIN","og:description":"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2023-11-25T22:25:25+00:00","article:modified_time":"2024-05-24T11:10:50+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"A Pilot Program for Critical Infrastructure - CTIN","twitter:description":"Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"1653","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":{"category":27},"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:01:06","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-04-18 16:57:44","updated":"2025-08-25 22:01:06"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/\" title=\"Policy\">Policy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tA Pilot Program for Critical Infrastructure\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Policy","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/"},{"label":"A Pilot Program for Critical Infrastructure","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/25\/a-pilot-program-for-critical-infrastructure\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=1653"}],"version-history":[{"count":29,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1653\/revisions"}],"predecessor-version":[{"id":2997,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1653\/revisions\/2997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/1654"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=1653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=1653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=1653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}