Food Safety
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • PRODUCTS
  • TOPICS
  • PODCAST
  • EXCLUSIVES
  • BUYER'S GUIDE
  • MORE
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin
  • NEWS
  • Latest News
  • White Papers
  • TOPICS
  • Contamination Control
  • Food Types
  • Management
  • Process Control
  • Regulatory
  • Sanitation
  • Supply Chain
  • Testing and Analysis
  • EXCLUSIVES
  • Food Safety Five Newsreel
  • eBooks
  • FSM Distinguished Service Award
  • Interactive Product Spotlights
  • Videos
  • MORE
  • ENEWSLETTER >
  • Store
  • Sponsor Insights
  • ENEWSLETTER >
  • Archive Issues
  • Subscribe to eNews
  • EMAG
  • eMagazine
  • Archive Issues
  • Editorial Advisory Board
  • Contact
  • Advertise
Food Safety
search
cart
facebook twitter linkedin
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Safety
  • NEWS
    • Latest News
    • White Papers
  • PRODUCTS
  • TOPICS
    • Contamination Control
    • Food Types
    • Management
    • Process Control
    • Regulatory
    • Sanitation
    • Supply Chain
    • Testing and Analysis
  • PODCAST
  • EXCLUSIVES
    • Food Safety Five Newsreel
    • eBooks
    • FSM Distinguished Service Award
    • Interactive Product Spotlights
    • Videos
  • BUYER'S GUIDE
  • MORE
    • ENEWSLETTER >
      • Archive Issues
      • Subscribe to eNews
    • Store
    • Sponsor Insights
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
    • eMagazine
    • Archive Issues
    • Editorial Advisory Board
    • Contact
    • Advertise
  • SIGN UP!
ManagementBest PracticesFood DefenseRisk Assessment

An Information Sharing and Analysis Center for the Food and Agriculture Sector

The food and agriculture sector is the only U.S. critical infrastructure without a threat Information Sharing and Analysis Center (ISAC)

By Robert A. Norton Ph.D., Marcus (Marc) Sachs P.E.
connected world

Image credit: DKosig/E+ via Getty Images

February 6, 2023

Food safety is, under the best of circumstances, a formidable endeavor that must balance policy with practice to protect the public health, the company and brand image, and the bottom line. That is business as usual. These are not ordinary times, however. The food industry continues to struggle with the many disruptions that occurred during the COVID-19 pandemic. A key issue is finding sufficient qualified employees, combined with the complex challenges of food safety training and protocol maintenance for these new and increasingly transient employees. Many managers also report problems that emerge from "not knowing their employees." This increases the potential for insider threats to emerge among disgruntled employees.

Cyber challenges are, likewise, increasing. Adversaries of all types use the internet to gain access to companies and steal anything of value. Hacktivists maliciously seek to achieve social justice, undermine public trust, alter policy, and damage food companies with which they disagree. Criminal organizations aim to rob and steal anything of value, including personally identifiable information (PII), which can be sold on the "Dark Web"—a part of the World Wide Web that is largely invisible to most people and is where criminal activities thrive.

Nation states, such as China, North Korea, and Iran, increasingly target U.S. critical infrastructure. The food and agriculture sector is part of their hybrid warfare campaign, intending to degrade and destroy systems capabilities, as well as gather intelligence that can be later used to challenge the U.S. militarily and economically.

An increasingly critical element of food safety and defense planning is assurance of data integrity—the ability to keep data unchanged as it is communicated or stored. Information being used for decision-making or reporting (e.g., government records) cannot be compromised, altered, or manipulated by unauthorized users.

Food companies generate, store, and disseminate massive amounts of data through information technology (IT) and operational technology (OT) systems. IT systems are the computers, data storage devices (e.g., servers), and networking devices that support essential business or enterprise operations, including those related to food safety and food defense monitoring and record-keeping. OT systems are the infrastructure, hardware, and software that control and monitor processes within food companies that enable the conversion of raw foodstuffs into products suitable for direct consumption, cooking, transport (e.g., cold chain), or storage. Cybersecurity for each of these complex and essential systems is similar, but in some ways distinct. Robust cybersecurity is an essential element of a comprehensive food safety plan and must complement other defensive programs.

Data sharing, like data integrity and cybersecurity, is a critical business function. Data sharing is generally internal to a company. A distinction is made here to external reporting, such as that which occurs with suppliers, logistics providers, or even government. Information sharing is a version of data sharing and is particularly important when it comes to threat-related information. Information can flow in both directions. Outwardly directed communication occurs when a company voluntarily shares information with other companies, sectors, or the government—for example, when a cybersecurity or food safety event occurs. Inwardly directed communication occurs when a company receives information that is voluntarily disseminated from other places, such as another company or the government.

Threat information is often transcendent in the sense that since any company can become a victim, it is advantageous that this information be shared, by everyone, even with competitors. If all companies willingly do so, everyone benefits. How is threat information best shared? The proven way is through the establishment and voluntary participation of an Information Sharing and Analysis Center (ISAC).

The food and agriculture sector is a critical infrastructure. The Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security defines critical infrastructures as those "…sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof."1

CISA likewise defines national critical functions (NCFs) as those "…functions of government and the private sector so vital to the United States that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof."2 In the case of Food and Agriculture, CISA indicates that the purpose of the NCFs are twofold:

  1. Produce and provide agricultural products and services
  2. Produce and provide human and animal food products and services.

Put simply, the infrastructure and personnel in the sector are essential to the production, safety, and distribution of the food supply.

So why does the Food and Agriculture sector not have an ISAC? Part of the answer is that there is reluctance to share information with potential competitors and regulatory agencies within government. Those concerns can be mitigated by understanding the functions of ISACs and how information is shared.

ISACs are owned and operated by the member constituents, not by the government. Membership is voluntary, and although there may be information sharing requirements, all shared information is anonymized and protected. Since it represents a critical infrastructure, information handled by the ISAC is considered protected critical infrastructure information (PCII) and, therefore, is not subject to Freedom of Information Act (FOIA) requests. This exclusion from FOIA enquiries is based on Exemption 4, which "protects trade secrets and commercial or financial information that is obtained from outside the government and that is privileged or confidential,"3 and Exemption 9, which "protects geological and geophysical information and data, including maps, concerning wells."4

ISAC information is also accessible only to members and, therefore, is not made public or given to regulatory agencies. Food companies have expressed concern that establishing an ISAC would make them vulnerable to the accusation of collusion or price-fixing. ISACs deal only in threat-related information that can be legally shared with other companies. This type of data sharing is done regularly and successfully within other sectors, such as banking, energy, communications, and transportation, all of which have ISACs. Food and agriculture is the only sector that lacks an ISAC.

With security threats against the sector increasing and cyber threats against the global supply system also on the rise, it is imperative that a food and agriculture ISAC be formed. It does not have to be fully capable at the start; just a few large companies that agree to pool and analyze threat information can plant the initial seed. If successful awareness and deterrence can be demonstrated, then other companies will join. At full capability, the ISAC can serve as a watch and warning center for the sector, providing timely threat analysis for members at all levels.

In the next article, the authors will look at what it takes to create and run a successful ISAC.

References

  1. U.S. Cybersecurity and Infrastructure Security Agency. "CISA's Role in Infrastructure Security." https://www.cisa.gov/infrastructure-security.
  2. U.S. Cybersecurity and Infrastructure Security Agency. "National Critical Functions." https://www.cisa.gov/national-critical-functions.
  3. U.S. Department of Justice Archives. Freedom of Information Act Guide, 2004 Edition. "Exemption 4." May 2004. Updated December 3, 2021. https://www.justice.gov/archives/oip/foia-guide-2004-edition-exemption-4.
  4. U.S. Department of Justice Archives. Freedom of Information Act Guide, 2004 Edition. "Exemption 9." May 2004. Updated December 3, 2021. https://www.justice.gov/archives/oip/foia-guide-2004-edition-exemption-9.

Robert A. Norton, Ph.D., is a Professor and National Security Liaison in the Office of the Vice President of Research and Economic Development at Auburn University. He specializes in national security matters and open-source intelligence, and coordinates research efforts related to food, agriculture, and veterinary defense.

Marcus Sachs, P.E., is the Deputy Director for Research at Auburn University's McCrary Institute for Cyber and Critical Infrastructure Security. He has deep experience in establishing and operating sharing and analysis centers including the Defense Department's Joint Task Force for Computer Network Defense, the SANS Institute's Internet Storm Center, the Communications ISAC, and the Electricity ISAC.

KEYWORDS: cybersecurity food and agriculture sector food fraud information sharing and analysis center

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robert norton
Robert Norton, Ph.D. is a Professor and National Security Liaison in the Office of the Vice President of Research and Economic Development at Auburn University. He specializes in national security matters and open-source intelligence, and coordinates research efforts related to food, agriculture, and veterinary defense.

Marcus (Marc) Sachs, P.E. is the Senior Vice President and Chief Engineer at the Center for Internet Security. He is a retired U.S. Army Officer and was a White House appointee in the George W. Bush administration. His private sector experience includes serving as the Deputy Director of SRI International's Computer Science laboratory, as the Vice President for National Security Policy at Verizon Communications, as the Senior Vice President and Chief Security Officer of the North American Electric Reliability Corporation (NERC), and as the Chief Security Officer of Pattern Computer. He was also the Director of the SANS Internet Storm Center and has co-authored several books on information security. He holds degrees in civil engineering, computer science, and technology commercialization, and is a licensed Professional Engineer.

Recommended Content

JOIN TODAY
to unlock your recommendations.

Already have an account? Sign In

  • people holding baby chicks

    Serovar Differences Matter: Utility of Deep Serotyping in Broiler Production and Processing

    This article discusses the significance of Salmonella in...
    Meat/Poultry
    By: Nikki Shariat Ph.D.
  • woman washing hands

    Building a Culture of Hygiene in the Food Processing Plant

    Everyone entering a food processing facility needs to...
    Sanitation
    By: Richard F. Stier, M.S.
  • graphical representation of earth over dirt

    Climate Change and Emerging Risks to Food Safety: Building Climate Resilience

    This article examines the multifaceted threats to food...
    Best Practices
    By: Maria Cristina Tirado Ph.D., D.V.M. and Shamini Albert Raj M.A.
Subscribe For Free!
  • eMagazine Subscription
  • Subscribe to eNewsletter
  • Manage My Preferences
  • Website Registration
  • Subscription Customer Service

Food Safety Five Ep. 11: New Foodborne Illness Data and Research From CDC

Food Safety Five Ep. 11: New Foodborne Illness Data and Research From CDC

Food Safety Five Ep. 12: New Sanitation and Growth Prediction Methods for Listeria

Food Safety Five Ep. 12: New Sanitation and Growth Prediction Methods for Listeria

Food Safety Five Ep. 10: Scientific Advancements in Listeria Knowledge and Detection

Food Safety Five Ep. 10: Scientific Advancements in Listeria Knowledge and Detection

Food Safety Five Ep. 9: Major Changes at FDA, CDC, USDA Under Trump Administration

Food Safety Five Ep. 9: Major Changes at FDA, CDC, USDA Under Trump Administration

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Food Safety Magazine audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Food Safety Magazine or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Deli Salads
    Sponsored byCorbion

    How Food Safety is Becoming the Ultimate Differentiator in Refrigerated and Prepared Foods

Popular Stories

Image of Tyson Foods logo and the logos of Tyson Foods brands

Tyson Foods is Reformulating Food Products to Eliminate Petroleum-Based Synthetic Dyes

USDA building.jpg

More Than 15,000 USDA Employees Take Trump Administration's Resignation Offer

Woman reading the warning label on a bottle of wine

A 40-Year Hangover: Efforts to Revive 1980s Advocacy About the Potential Negative Effects of Alcohol Consumption

Events

May 12, 2025

The Food Safety Summit

Stay informed on the latest food safety trends, innovations, emerging challenges, and expert analysis. Leave the Summit with actionable insights ready to drive measurable improvements in your organization. Do not miss this opportunity to learn from experts about contamination control, food safety culture, regulations, sanitation, supply chain traceability, and so much more.

May 13, 2025

Traceability Next Steps—Supply Chain Implementation

Live Streaming from the Food Safety Summit: Join us for this engaging and highly practical workshop focused on building and sustaining traceability efforts across the food supply chain. 

May 13, 2025

Effective Sanitation Basics

Live Streaming from the Food Safety Summit: This dynamic workshop will help participants understand the sanitation process, effective monitoring, use of data streams, and root cause analysis basics.

View All

Products

Global Food Safety Microbial Interventions and Molecular Advancements

Global Food Safety Microbial Interventions and Molecular Advancements

See More Products
Environmental Monitoring Excellence eBook

Related Articles

  • cyber threats

    Cyber Threats Impacting the Food and Agriculture Sector

    See More
  • beware sign on top of circuits

    Cognitive Security, a Growing Concern for Food Safety: Part 4

    See More
  • woman using an app in a meat room

    Cognitive Security, a Growing Concern for Food Safety: Part 3

    See More

Related Products

See More Products
  • 9781138198463.jpg

    Food Safety Management Programs: Applications, Best Practices, and Compliance

See More Products
×

Never miss the latest news and trends driving the food safety industry

eNewsletter | Website | eMagazine

JOIN TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • Instagram
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Food Safety
search
cart
facebook twitter linkedin
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Safety
  • NEWS
    • Latest News
    • White Papers
  • PRODUCTS
  • TOPICS
    • Contamination Control
    • Food Types
    • Management
    • Process Control
    • Regulatory
    • Sanitation
    • Supply Chain
    • Testing and Analysis
  • PODCAST
  • EXCLUSIVES
    • Food Safety Five Newsreel
    • eBooks
    • FSM Distinguished Service Award
    • Interactive Product Spotlights
    • Videos
  • BUYER'S GUIDE
  • MORE
    • ENEWSLETTER >
      • Archive Issues
      • Subscribe to eNews
    • Store
    • Sponsor Insights
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
    • eMagazine
    • Archive Issues
    • Editorial Advisory Board
    • Contact
    • Advertise
  • SIGN UP!