What We Do
Defense Security Information Exchange (DSIE) members maximize the organizational benefits of membership by maintaining high activity in the exceptionally top quality threat intelligence sharing environment that has defined DSIE as a cyber center of excellence without commercial parallel. Our members engage with one another in trusted and protected cyber threat collaboration; participating in risk reduction activities enabling them to continuously improve their threat analytical capabilities. They collaborate in efforts to develop and/or leverage common platforms and services in manners designed to enhance the collective security of DSIE member enterprises as well as the security of their key suppliers.
DSIE members also engage in periodic hosted technical exchanges, training WebEx discussions, and involvement in technical working groups that are focused on specific aspects of threat detection/mitigation, tools development and implementation, and/or the identification and alignment of required capabilities and services for collective development. In addition, CISOs and CIOs may participate in an annual CISO Summit to discuss executive-level strategic operational issues.
The DSIE organizational trust model among its membership is relatively unique. Unlike other organizations of similar objective, internal DSIE threat information sharing and collaborative coordination is generally done with full attribution among the participants. All are governed by a mutually exercised non-disclosure agreement, and all have the confidence that data shared and context discussed is not subject to further dissemination, or in uses that could compromise either the data or attribute the source of the data without the affirmative permission of all involved in the discussion environment. As a result, DSIE threat sharing and collaboration occurs with an exceptional degree of trust, candor, and cooperation; and is undertaken with full confidence that all information shared and mitigation strategies discussed will not be attributed beyond the trusted environment. This doesn’t only provide mutuality of trust, it also provides an immediate perspective of the trustworthiness and value of the data shared based upon its attributed source.