
WHAT WE DO
The IT-ISAC originally established the Food and Agriculture Special Interest Group (SIG) in 2013 to help what was then a small number of member companies in the industry protect their enterprise.
​
We will continue as the Food and Ag-ISAC, recognizing the growth of the community, the capabilities developed, and the members' commitment to securing not only their enterprise but the sector as a whole.
HOW WE MAKE IT HAPPEN

ADVERSARY ATTACK PLAYBOOKS
A collection of tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs) surrounding specific threat actors and their individual campaigns. The playbooks incorporate MITRE’s ATT&CK framework and bolster members’ ability to view and share historical and current adversarial information. Each playbook has been developed by our analytic team and updated in collaboration with members.

INCIDENT RESPONSE
Timely, incident-specific alerts developed by the Food and Ag-ISAC, security partners, and members. Members can also issue Requests for Assistance and Requests for Information to the Food and Ag-ISAC team, peer analysts in ISAC member companies, and our global network of security professionals.
INTELLIGENCE MANAGEMENT PLATFORM
Food and Ag-ISAC members receive access to the threat intelligence management platform, LevelBlue as part of their membership. Members leverage the platform to identify and prioritize threats and access automated sharing and threat analysis. Members can use custom API and STIX/TAXII integrations to pull indicators from the U.S. Department of Homeland Security, peer members, and partners across the globe into their internal security tools.
RANSOMWARE TRACKER
Since 2021, the IT-ISAC team has maintained a robust ransomware tracker with information being sourced from open-source sites, the dark web, member input, and information shared through the National Council of ISACs (NCI). As of September 2025, the ransomware tracker has recorded over 12,000 events.
STRATEGIC AND TACTICAL ANALYSIS
Curated reports developed by Food and Ag-ISAC analysts including daily reports that highlight and link to key security incidents, events, and vulnerabilities, weekly reports that highlight major events from throughout the week, weekly Vulnerability and Exploitation Reports (VEAR), breaking news reports, incident analysis reports, and quarterly trending malware reports.

