CTA intelligence sharing is grounded in 5 guiding principles
LEARN MORE ABOUT MEMBERSHIP TODAY
Join your peers in sharing cyber threat intelligence to better protect your customers and digital ecosystem.
CTA membership offers different tiers, with varying levels of financial contribution and governance involvement, to suit a diverse array of organizational needs and goals.
TOTAL EARLY SHARES
Average Total Observables Per Month
Observable Diversity (average)
|40% File Hash||7% File Properties|
|29% Network Traffic||4% Domain Name|
|15% IP Address||1% Host|
TOTAL OBSERVABLES SHARED
OUR AREAS OF FOCUS
ALGORITHM & INTELLIGENCE
Oversees the sharing algorithm and platform to incentivize valuable sharing.
Supports new member recruitment and reviews all membership applications for approval.
Informs marketing and PR activities in support of the CTA’s mission and objectives.
PUBLIC POLICY & STANDARDS
Serves as an advocacy arm to inform policy initiatives.
FINANCE & AUDIT
Provides budget oversight and serves an internal audit function.
SECURITY & OPERATIONS
Enhances and secures the CTA Platform and infrastructure.
Cyber Threat Alliance Vulnerability Disclosure Policy
The CTA is committed to raising the level of cybersecurity across our digital ecosystem. In line with that mission, CTA believes that identifying, reporting, and addressing hardware and software vulnerabilities is an essential component of any organization’s cybersecurity program. The purpose of this policy is to foster an open partnership with the security researcher community, and we recognize the work that community does to improve cybersecurity for CTA, its Members, and the broader internet.