How Federal-Private Relationships Help Identify Cyberattacks Faster
Leadership from the FBI, NSA and CISA said information-sharing and stakeholder collaboration inform threat intelligence and national security response.

Federal cyber leaders called for increased communication, relationship-building and information-sharing between federal agencies, private vendors and key cyber partners like the Federal Bureau of Investigation, the National Security Agency, and the Cybersecurity and Infrastructure Security Agency over the last year, resulting in initiatives like CISA Director Jen Easterlyโs Joint Cyber Defense Collaborative (JCDC) and the cyber incident-reporting mandate.
These partnerships and initiatives resulted in quick identification of distributed denial of services attacks in Ukraine and examination of the potential threat and impact on the United States, CISA Joint Cyber Defense Collaborative Chief Erin Shepley said at the RSA Conference in San Francisco Monday.
โWe were able to get those indicators of compromise around โฆ share them with the private sector and quickly access are any targets coming for the United States? Are they targeting their financial sector? Whatโs going on here?โ Shepley said. โWe wouldnโt have been able to do that work without the private sector, so thatโs just one example of many in that particular instance, where it was critical that we use their tooling, their technology and their visibility to understand what impact youโre going to see.โ
NSA Chief of Enduring Security Framework Natalie Pittore said she works with her agencyโs Cybersecurity Collaboration Center and cultivates industry partnerships to prevent and address foreign cybersecurity threats across national security systems, the defense industrial base and Defense Department. She said that although threat intelligence data is important in her field of work, the people and collaboration across organizations bring critical context and creativity in combating cybersecurity threats.
โWe have a threat against the defense industrial base โ weโre unified by a common purpose, weโre unified by this common goal,โ Pittore said. โThat creativity and innovation that really comes from it is, what I see, is like secret sauce โ that richness thatโs really coming from the work, and I think thatโs why weโre seeing so much when it comes to our services, our advisories and everything coming out.โ
FBI Supervisory Senior Resident Agent Scott Hellman said agencies like his have seen ransomware balloon over recent years and have taken on a variety of forms, from nation-state attacks to criminal activity.
Through relationships with federal and private partners, the FBI draws information about the evolving nature of various cyberattack vectors and crimes โ including how actors are overcoming security measures like multi-factor authentication (MFA), a key component of zero trust.
โEverybody knows security is never simple,โ Hellman said. โItโs always a multi-layered approach, but youโve got to have your core basics in check as best as you can. We saw 324,000-plus phishing attacks get reported to the FBI in 2021 along, and some of the largest breaches that we saw throughout the year stemmed from password reuse and social engineering to bypass multi-factor authentication.โ
Although the FBI, NSA and CISA have been developing connections with each other and the private-sector, leaders from the agencies said that there are still some important steps that their partners need to take. For Hellman, itโs developing and understanding a disaster recovery plan. For Shepley, itโs anonymizing and sharing information as soon as possible when an incident occurs.
โFind a way to anonymize [the incident data] so that we can identify if itโs part of a broader campaign? Can we alert the rest of critical infrastructure?โ Shepley said. โBecause thatโs really one of those benefits thatโs going to happen. Ttโs the hardest. No one wants to share during that period, but itโs beneficial.โ
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Labโs Pioneer Approach to AI
Energy Departmentโs Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NISTโs Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read -
Rep. Gerry Connolly Leaves Lasting Mark on Federal Tech
Connolly's leadership in Congress significantly advanced government IT, emphasizing accountability, efficiency and a robust cybersecurity posture.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read