All Hazards Consortium
  • Home
    • Vision / Mission >
      • Who Is The AHC? >
        • AHC Leadership
        • Who Are Stakeholders
        • How Does The AHC Address Issues?
    • Working Groups Overiew
    • Commercialization
    • AHC Facilitation Capabilities
  • STORM Central
    • ELLIOTT DEC 2022
    • Ian Sept 2022
    • LANDON FEB 2022
    • IZZY Jan 2022
    • NICHOLAS Sep 2021
    • IDA Aug 2021
    • HENRI Aug 2021
    • FRED Aug 2021
    • ELSA July 2021
    • Tabitha / Uri / Viola Feb 2021
    • ETA Nov 2020
    • ZETA Oct 2020
    • DELTA Oct 2020
    • SALLY Sept 2020
    • LAURA AUG 2020
    • MARCO AUG 2020
    • ISAIAS July 2020
    • Spring Storm April 2020
    • Corona Virus March 2020
    • Hurricane DORIAN Aug 2019
    • Tropical Storm BARRY July 2019
    • ULMER 3/14/2019
    • HARPER 1/18/2019
    • DIEGO 12/7/2018
    • CA Wild Fires
    • MICHAEL 10/7/2018
    • FLORENCE 9/9/2018
    • GORDAN 9/2018
    • FEMA Exercise May 2018
    • TOBY 3/20/2018
    • QUINN 3/6/2018
    • RILEY 3/3/2018
    • Puerto Rico Fleet Movement
    • Winter Storm 1/16/2018
    • Wind Storm Oct 30 2017
    • NATE 10/6/2017
    • MARIA 9/20/2017
    • IRMA 9/1/2017
    • HARVEY 8/25/2017
    • CATEX 2017 Exercise
    • FEMA Exercise 5/2/2017
    • STELLA 3/14/2017
    • JUPITER 1/14/2017
    • FORTIS 12/29/2016
    • Pipeline Incident 10-31-2016
    • Mathew 10/3/2016
    • Pipeline 9/20/2016
    • Julia 9/15/2016
    • Hermine 9/1/2016
    • Invest 99L 8/25/2016
    • COLIN 6/7/2016
    • Heat Wave/Storms 7/24/2016
    • PETROS 2/25/2016
    • LEXI 2/5/2016
    • JONAS 1/21/2016
    • JOAQUIN 10/1/2015
  • Reports
  • EVENTS
    • Annual Summit
    • Event Catalog
    • Past Events
    • Join our Speaker’s List
  • Initiatives
    • MS TEAMS Integration
    • Cyber Cloaking
    • STORM School
    • SISE
    • SISEnet
    • Cross-Sector Exercises
    • ORL Data Standard
    • BRIC 25% Match
    • ENDEAVOR Work Group
  • Join Us
    • Membership
    • Sponsorship
Picture

The “cyber cloaking” initiative leverages emerging technology that can actually hide (make invisible) or “cloak” any IP device, server(s) or secure cloud services rendering them invisible to internal searches, external cyber-hackers, and internet bots.

Register with the private sector's SISE
THE PROBLEM
  • Cyber risk is complex and involves multiple layers, including hardware, software, devices, networks, and people. Because of global IP visibility, any device can see and attack any other device unless it is encrypted, and data is spewing out at all layers.
  • Also, virtually all malware (~94%) is injected via web browsers.
  • The members of AHC are diverse and include enterprises of all sizes, government agencies and NGOs with varying cyber expertise, maturities, systems, devices and requirements.



THE SOLUTION
  • The All Hazards Consortium Secure Information Sharing Exchange (SISE) Net “cloaking initiative” enables a highly secure collaboration environment across large numbers of organizations with varying cyber maturity standards/practices.
  • Instead of running an app locally where the device processes the code, end-users are authenticated through a web interface into the AHC SISE Net, where they securely access enterprise network and cloud applications, including Microsoft Teams.
  • The applications are running in a secure cloud where an image of the data (not the actual data) is streamed to the device over a secure tunnel.
  • Includes role-based access and MFA (Multi-factor Authentication) along with continuous monitoring for threats and for compliance with rules of engagement (minimum cyber maturity standards).
  • Cloaked environment is continuously monitored (real-time) for threats and for compliance. 

THE RESULTS
  • Cyber Cloaking's  secure application streaming moves the browser to a secure cloud (off devices), which moves the enterprise attack surface and that of its partners and members to a secure environment.
  • This extends the secure cloud all the way out to the edge and dramatically reduces the attack surface. Sensitive data never leaves the secure environment.
  • Privacy by default.
  • Data on user’s device is never exposed.
  • Can’t track Individual transactions at the network edge.
FAQs

1) What is the cyber cloaking initiative?


  • The All Hazards Consortium's Secure Information Sharing Exchange (SISE)  “cloaking initiative” enables a highly secure collaboration environment across large numbers of organizations with varying cyber maturity standards/practices.
  • Instead of running an app locally where the device processes the code, end-users are authenticated through a web interface into the private sector's SISE, where they securely access enterprise network and cloud applications, including Microsoft Teams.
  • The applications are running in a secure cloud where an image of the data (not the actual data) is streamed to the device over a secure tunnel.
 
2) What problem does it solve?

  • Invisible IP's: Cyber risk is complex and involves multiple layers, including hardware, software, devices, networks, and people. Because of global IP visibility, any device can see and attack any other device unless it is encrypted, and data is spewing out at all layers. This approach makes IP addresses invisible to the internet and external hackers.
  • Immediate Threat Reduction: Virtually all malware (~94%) is injected via web browsers. When implemented, the approach immediately reduces an organization's cyber threat-footprint across all devices that users browsers.
  • Diverse Users: The members of AHC are diverse and include enterprises of all sizes, government agencies and NGOs with varying cyber expertise, maturities, systems, devices and requirements.
  • Secure Access: Allows end-users to access resources in a secure manner without having to load an application on a device.
  • Compliance with Standards: This approach includes role-based access and MFA along with continuous monitoring for threats and for compliance with rules of engagement (minimum cyber maturity standards).
 
3) What benefits does it bring?
  • Secure application streaming moves the browser to a secure cloud (and off of devices), which moves the enterprise attack surface and that of its partners and members to a secure environment. This reduces the cyber attack footprint dramatically, which reduces the overall cyber threat to the organization.
  • This extends the secure cloud all the way out to the edge and dramatically reduces the attack surface.
  • Sensitive data never leaves the secure environment.
  • Data on user’s devices is never exposed which creates data privacy by default.
  • Hackers can’t track individual transactions at the network edge.



Register with the private sector's SISE
2023 All Hazards Consortium. All Rights Reserved. Privacy Statement
  • Home
    • Vision / Mission >
      • Who Is The AHC? >
        • AHC Leadership
        • Who Are Stakeholders
        • How Does The AHC Address Issues?
    • Working Groups Overiew
    • Commercialization
    • AHC Facilitation Capabilities
  • STORM Central
    • ELLIOTT DEC 2022
    • Ian Sept 2022
    • LANDON FEB 2022
    • IZZY Jan 2022
    • NICHOLAS Sep 2021
    • IDA Aug 2021
    • HENRI Aug 2021
    • FRED Aug 2021
    • ELSA July 2021
    • Tabitha / Uri / Viola Feb 2021
    • ETA Nov 2020
    • ZETA Oct 2020
    • DELTA Oct 2020
    • SALLY Sept 2020
    • LAURA AUG 2020
    • MARCO AUG 2020
    • ISAIAS July 2020
    • Spring Storm April 2020
    • Corona Virus March 2020
    • Hurricane DORIAN Aug 2019
    • Tropical Storm BARRY July 2019
    • ULMER 3/14/2019
    • HARPER 1/18/2019
    • DIEGO 12/7/2018
    • CA Wild Fires
    • MICHAEL 10/7/2018
    • FLORENCE 9/9/2018
    • GORDAN 9/2018
    • FEMA Exercise May 2018
    • TOBY 3/20/2018
    • QUINN 3/6/2018
    • RILEY 3/3/2018
    • Puerto Rico Fleet Movement
    • Winter Storm 1/16/2018
    • Wind Storm Oct 30 2017
    • NATE 10/6/2017
    • MARIA 9/20/2017
    • IRMA 9/1/2017
    • HARVEY 8/25/2017
    • CATEX 2017 Exercise
    • FEMA Exercise 5/2/2017
    • STELLA 3/14/2017
    • JUPITER 1/14/2017
    • FORTIS 12/29/2016
    • Pipeline Incident 10-31-2016
    • Mathew 10/3/2016
    • Pipeline 9/20/2016
    • Julia 9/15/2016
    • Hermine 9/1/2016
    • Invest 99L 8/25/2016
    • COLIN 6/7/2016
    • Heat Wave/Storms 7/24/2016
    • PETROS 2/25/2016
    • LEXI 2/5/2016
    • JONAS 1/21/2016
    • JOAQUIN 10/1/2015
  • Reports
  • EVENTS
    • Annual Summit
    • Event Catalog
    • Past Events
    • Join our Speaker’s List
  • Initiatives
    • MS TEAMS Integration
    • Cyber Cloaking
    • STORM School
    • SISE
    • SISEnet
    • Cross-Sector Exercises
    • ORL Data Standard
    • BRIC 25% Match
    • ENDEAVOR Work Group
  • Join Us
    • Membership
    • Sponsorship