Welcome to CRI

Cyber Resilience for the
Whole-of-Society

CRI provides the connection for information exchange to enable national advocacy, knowledge sharing, community organizing, training resources and local activities for the advancement of cyber resilience.

Announcements

01/17/25 – CRI continues to serve as a community member of the U.S. Department of State Overseas Advisory Council (OSAC) through 2025.

07/01/2024 – CRI has once again joined forces with CyberUSA for promoting nation-wide cyber resilience programs.

01/03/2024 – CRI continues to support the mission of Infragard through various state-level chapters.

01/01/2024 – CRI provides review comments on the operational resilience framework of the Global Resilience Federation (GRF).

02/01/2023 – The Sports-ISAO will be standing up a Pop-up SOC for the U.S. Football event – The Superbowl

11/01/2022 – The Sports-ISAO will be standing up a Pop-up SOC for the FIFA-sponsored Men’s World Cup in Doha, Qatar.

01/09/2022 – The Sports-ISAO is gearing up for the 2022 Beijing Olympics.

09/22/2021 – Webmaster Martin Burrows will be presenting a paper at the 15th International Symposium for Olympic and Paralympic Research’s Committee

08/31/2021 – Wrapped up final reporting on the Tokyo Olympics

06/30/2021 – c-Market Toolkit consolidated on CRI Website. Go to the c-Market dropdown to access Toolkit links.

12/8/2020– CRI Board Member Jane Ginn has been honored by Oasis Open. Click on the following link to learn more Jane’s contributions and Oasis Open.

11/17/2020– The November Cybersecurity and Information Environment webinar is pleased to host the Cyber Resilience Institute’s (CRI) Doug DePeppe and Jane Ginn on November 17th at 3PM MST. Click on this link to register.

8/23/2020– Network Traffic Analysis and the ATT&CK Framework webinar recording available with Stephen H. Campbell.

8/22/2020 – Online content now available for free on cyber threat hunting models.

8/20/2020Enroll now for the upcoming c-Watch Elections2020 training – It starts October 5th, 2020.

6/19/2020– Exciting news as the Cyber Resilience Institute partners with the National Cybersecurity Center on c-Watch Training.

5/26/2020– New posts in our blog section. Go and check it out!!

4/26/2020– Check out our research page for the latest in research concerning COVID-19 and cybersecurity.

Contact us to learn about our educational programs, research and potential partnerships.

About Us

The Cyber Resilience Institute (CRI) is a 501(c)(3) nonprofit organization engaged in resilience activities and programming designed to build cyber capacity in communities, and to achieve outcomes in protecting critical infrastructure/key resources throughout the United States. Our mission is to help communities build operational and sustainable Private-Public Partnerships (PPPs) and cybersecurity information sharing environments centered on enabling market forces.

CRI is a national organization that also forms international partnerships. We advance initiatives and partner in the advancement of community and regional initiatives that are innovative and demonstrate capacity-building outcomes associated with Information Sharing and Analysis Organizations (ISAOs) and Information Sharing and Analysis Centers (ISACs), particularly concerning the knowledge, workforce, trade-craft and build-out of cyber threat intelligence sharing capabilities.

CRI is the primary sponsor of the Sports-ISAO program and the event-based pop-up security operations centers (SOC) that have been stood-up in support of major global sporting events.  An outgrowth of CRI’s efforts with the Sports-ISAO has been the creation of the c-Watch program which provides apprenticeship opportunities within the SOCs for aspiring cyber threat hunters.

The Cyber Resilience Institute has a mission of promoting the buildout of cyber capacity at community levels, as a strategy to address the Down Market Gap (DMG). The DMG refers to the lack of appetite for cyber spend below the enterprise market, and the resulting low level of cyber hygiene in communities across the country, particularly among small and mid-sized businesses. This gap presents systemic risk because of the supply chain and the interconnectivity and interdependencies of all Internet users.

How to Shield Your New Business Against Cyber Threats

Guest Post By Derek Goodman If you’re thinking about starting a business, there are likely hundreds of things on your mind. While it’s important to consider what exactly it is you’re selling, who your target audience is, and how you’re going to get your first customers, don’t forget about cybersecurity. Shielding your business from security …

It’s Precedent — The Human Body is Subject to Property Law, which Enables a Digital DNA Right

By: Doug DePeppe, Esq. The ramifications of the premise are of course transformative — imagine if all data associated with a person were owned by that person! It would substantially disrupt the data-driven ecosystems of Silicon Valley (and everywhere else). More importantly, individuals would regain control over their digital identity. HEY! THAT’S MY FINGER Since the …

Cyber Wyoming Conference

Wyoming’s Cybersecurity ConferenceRegistration Link:https://www.cyberwyoming.org/conference/October 6-8, mornings, virtualFree to government and students.Nonprofits $15. All others $25. Now offering POST and CPE credits!Oct 7 Theme:Security, Local – State – NationFeaturingProtecting Wyoming’s Critical Water Supply & InfrastructurewithMark Pepper, WARWS(Wyoming Association of Rural Water Systems)Gregory White, UTSA(University of Texas, San Antonio)Moderated by Jennifer Kocher(CyberWyoming Alliance Board Secretary and Wyoming …

STIX 2.1 Programmer’s Guide

Press the orange button below to launch the online course on STIX 2.1 

Launch Presentation

Integrating CTI Into Your SOC

Best practices for running a Security Operations Center (SOC) include tight integration with your threat hunting and analysis team for formulating actionable cyber threat intelligence (CTI). This training module walks you through the MITRE Corporation recommendations for fine tuning these operations.

Select the button below to start the training module.

Launch Presentation

Summary of Cyber Threat Hunting Models

Select the ‘Launch’ link to start the course on Threat Intelligence Frameworks used for Cyber Threat Hunting.

Launch Presentation