Hello, Guest!

Cybersecurity

CISA Seeking Potential Contractors Capable of Providing Threat Intelligence Enterprise Services

Cyber threat intelligence

CISA Seeking Potential Contractors Capable of Providing Threat Intelligence Enterprise Services

The Cybersecurity and Infrastructure Security Agency is conducting market research to identify potential contractors that can provide threat intelligence enterprise services to support the agency in improving its cyber threat intelligence capabilities.

CISA is looking for vendors that can develop or configure a cyber threat intelligence exchange platform and provide integration to customized CISA applications and commercial threat feed. According to a request for information posted on SAM.gov, the platform would serve as an integration point for analysts and infrastructure to receive, share and collaborate on relevant and timely CTI to detect cybersecurity risks, Nextgov reported.

The RFI stated that the CTI solution should ingest and aggregate CTI from Automated Indicator Sharing, which enables the real-time exchange of machine-readable cyber threat indicators and defensive measures, commercial threat intelligence feeds, and other sources.

It should also support the Structured Threat Information Expression data exchange format and the Trusted Automated Exchange of Intelligence Information data transfer mechanism; provide external clients with automated access to data and workflows through a representational state transfer application programming interface; and enable the ingestion, tagging and correlation of multiple threat-related data sets.

The General Services Administration posted the RFI on behalf of CISA. Interested parties may submit their responses until Dec. 19. GSA may schedule meetings with select contractors to discuss their responses to the notice.

Potomac Officers Club Logo
Become a Potomac Officer Club Insider
Sign up for our weekly email & get exclusive event, and speaker updates, and find networking opportunities to connect with GovCon decision makers.

Category: Cybersecurity