MM-ISAC Blog

Digging into cyber resilience in mining and metals.

1 min read

Psychological First Aid – A Skill Needed in Resilience

When a cyberattack strikes, the immediate focus is often on technical recovery: restoring systems, protecting data, and resuming operations. But what about the people responding to the crisis? Behind every incident response are teams of IT...

Read More

1 min read

A Cautionary Note on Sensationalism in Cyber Security Headlines

This month’s focus is on the importance of double-checking the work of security researchers and headlines. We live in a fast-paced news cycle and a...

Read More

2 min read

Phishing Education - Maybe 'Best Practice' is not Best After all

As security practitioners and leaders, we must contribute to the professionalization of our field by searching out data and evidence-based solutions...

Read More

2 min read

Moral Frameworks in CTI and High-Stakes Communications

We live in very polarizing times, particularly in the US. We choose our words carefully, tiptoe around topics that might devolve into argumentation...

Read More

3 min read

Precision vs Accuracy When Predicting Security Cost

As I talk through the practical application of the security cost framework with our members, we are consistently running into a common stumbling...

Read More

1 min read

Mining and Metals Incidents More Than Double in the First Quarter of 2025

At the Mining and Metals ISAC, we monitor cyber incidents and track trends within the mining and metals sector. Compared to last year, incidents have...

Read More

4 min read

Guide to Traffic Light Protocol (TLP)

Key Points: TLP is a Sharing Protocol. Companies that do not share threat information are at a disadvantage. Overclassification stifles sharing...

Read More

3 min read

Why is Cybersecurity in Mining More Important Now than Ever? - The Race to Secure Critical Minerals

If you work in cybersecurity in mining, it is easy to forget why we do what we do. We are not in the cybersecurity business; we are not merely...

Read More

3 min read

Building a Phishing Program

Phishing is a significant compromise vector for all companies in all industries. At theMining and Metals ISAC annual conference in November, we...

Read More

4 min read

Digging Into Security Cost

After my last post on using Security Cost as a metric and the basis for a core security team/CISO objective, a few Mining and Metals ISAC members...

Read More