The Truth About Critical Infrastructure Security

Simply Cyber
Simply CyberMay 20, 2026

Why It Matters

Effective, trusted intel sharing through ISACs reduces systemic risk to energy infrastructure, directly protecting economic stability and national security.

Key Takeaways

  • ISACs enable anonymized threat intel sharing across energy sector participants.
  • Trust and data sensitivity remain biggest barriers to effective information exchange.
  • Traffic Light Protocol classifies intel to balance security with actionable insight.
  • Federal funding shifts push some ISACs toward independent, member‑operated models.
  • Boardrooms must lower risk tolerance and prioritize backups for critical infrastructure.

Summary

The episode of Two Cyber Chicks spotlights critical‑infrastructure security through a deep dive into Information Sharing and Analysis Centers (ISACs). Guest Angela Han, a former FBI cyber‑crime specialist now leading ONE ISAC for oil, natural gas and renewable energy, explains how the organization functions as a trusted hub for anonymized threat intelligence across the energy sector.

Key insights include the importance of anonymizing shared data, the role of the Traffic Light Protocol (TLP) in labeling sensitivity, and the persistent trust gap that hinders full participation. Han notes that while the FBI and DHS balance national‑security concerns with actionable intel, the TLP framework helps prevent inadvertent disclosure to adversaries. Funding dynamics also surface: unlike federally‑backed ISACs such as the Multi‑State or Electricity ISAC, ONE ISAC remains member‑operated, prompting other groups to reconsider reliance on government dollars.

Memorable moments underscore the analogy of ISACs as a "neighborhood watch" and the real‑world impact of incidents like the Colonial Pipeline ransomware attack, which highlighted supply‑chain vulnerabilities and the need for robust backups. Han emphasizes that risk tolerance cannot be infinite; protecting "crown jewels" requires both technical safeguards and executive commitment.

For industry leaders, the discussion signals a clear mandate: strengthen public‑private partnerships, adopt standardized intel‑sharing protocols, and embed cyber resilience into boardroom risk assessments. As cyber threats evolve, the ability to share timely, anonymized intelligence will be a decisive factor in safeguarding national‑critical infrastructure.

Original Description

In this episode of 2 Cyber Chicks, Jax sits down with Angela Haun, Executive Director of the ONE-ISAC and a former FBI Special Agent with over two decades of experience protecting critical infrastructure.
Angela brings a rare, real-world perspective on cybersecurity—one where cyber incidents don’t just mean data loss, but physical consequences, national security implications, and economic disruption. She shares what it actually takes to protect the oil and natural gas sector, why information sharing is harder than everyone claims, and where leaders continue to underestimate risk.
This conversation explores:
- Why cyber threats to critical infrastructure are fundamentally different
- The realities of information sharing across highly regulated industries
- How trust is built and broken between private industry and government
- Why boards still struggle to understand cyber risk in physical terms
- The uncomfortable truths leaders need to hear about preparedness and accountability
If you care about cybersecurity beyond buzzwords where cyber meets physical, economic, and national security this episode is essential listening.
Connect with Angela:
Organization Website: https://www.oneisac.org
=========================
Connect with 2 Cyber Chicks:
LinkedIn: 2 Cyber Chicks Podcast
Email us: 2CyberChicks@gmail.com
Jax Scott, Founder, Outpost Gray
- YouTube: @OutPostGray
Erika McDuffie, Managing Principal, Coalfire Systems
#2cyberchicks
=========================
Learn more about our Season Sponsor @ThreatLocker
Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage. Learn more at https://threatlocker.com/2cyberchicks.
=========================
All the ways to connect with @SimplyCyber

Comments

Want to join the conversation?

Loading comments...