Work Groups

MS-ISAC Workgroups

The MS-ISAC Workgroups are comprised of dedicated members who volunteer their time and talent to assist with specific program areas and deliverables in support of the MS-ISAC's goals and objectives. The Workgroups convene on a regular basis and may change as needed to accommodate MS-ISAC Member needs and areas of interest. Currently, there are five active workgroups open to all MS-ISAC members: Business Continuity/Recovery/Cyber Exercises, Cyber Security Metrics, Education and Awareness, Intel and Analysis, and the Mentoring Program. The workgroups provide our members with guides, toolkits, webcasts, and much more!


Business Continuity, Recovery, and Cyber Exercise
Facilitate the sharing of people, processes, tools, and best practices in regards to Public Sector Business Continuity and Recovery.

Note: Recovery is not just technology, but includes business process (people, locations, communications) i.e.: recovery of the entire entity.

Cyber Security Metrics
Focused on recommending and implementing methodologies to help states with cyber security metrics and compliance inventory, assessment and audit of their cyber security assets. The workgroup has been working jointly with NASCIO to support the DHS' Nationwide Cyber Security Review.

Education and Awareness
Focused on recommending development of new - or identification of existing - cyber security education, awareness and training content for states and localities. This includes recommendation of the MS-ISAC programs for National Cyber Security Awareness Month.

Intelligence and Analysis
Focused on promoting the development, understanding and awareness of actionable intelligence and analysis.

Legislative and Compliance
Focused on tracking all major legislation, rules and regulations across the country relating to cyber security issues. The workgroup has assembled a number of links and resources for further information.

Mentoring Program
This program provides an opportunity for new security leaders in management positions (such as Chief Information Security Officers and Chief Security Officers) to network and learn from the experience of current security leaders.