{"id":503,"date":"2003-12-14T00:00:00","date_gmt":"2003-12-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/14\/financial-security-info-center-gets-2-million\/"},"modified":"2021-12-30T11:37:29","modified_gmt":"2021-12-30T11:37:29","slug":"financial-security-info-center-gets-2-million","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/14\/financial-security-info-center-gets-2-million\/","title":{"rendered":"Financial Security info center gets $2 million"},"content":{"rendered":"<p>The Treasury Department on Tuesday signed a $2 million one-time contract to upgrade the Financial Services Information Sharing and Analysis Center (FS\/ISAC), which serves as the central point for the sector&#8217;s critical infrastructure warnings.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The center is one of many that industries and their government liaisons formed since 1998 to share vulnerability information and alerts when incidents occur that affect critical infrastructure, such as telecommunications and banking.<\/p>\n<p>Money from Treasury will allow the center to expand to serve the entire financial industry, department officials said.  By the end of fiscal 2005, officials expect that the center will be funded entirely by membership fees, which range from $750 to $50,000 per year.  Upgrades include:<br \/>\n* Enhancing the network so it can serve more than 30,000 institutions.<br \/>\n* A secure forum for real-time information sharing.<br \/>\n* Physical data threats to the cyberthreat information.<br \/>\n* Web-based warnings and alerts service<br \/>\n* Setting more than 16 performance metrics<br \/>\nMore info: [url=http:\/\/www.fcw.com\/fcw\/articles\/2003\/1208\/web-fsisac-12-10-03.asp]http:\/\/www.fcw.com\/fcw\/articles\/2003\/1208\/web-fsisac-12-10-03.asp[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-503","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=503"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/503\/revisions"}],"predecessor-version":[{"id":2990,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/503\/revisions\/2990"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}