Close
SATEXPO 2026
Thursday, May 21, 2026
CIOE 2026

Private ISAC By U.S. Telecom Giants For AI-Led Cyberattacks

Note* - All images used are for editorial and illustrative purposes only and may not originate from the original news provider or associated company.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from any location or device.

Media Packs

Expand Your Reach With Our Customized Solutions Empowering Your Campaigns To Maximize Your Reach & Drive Real Results!

โ€“ Access the Media Pack Now

โ€“ Book a Conference Call

โ€“ Leave Message for Us to Get Back

Related stories

Keppel Executes IRU Agreement with Telstra International

Keppel has gone ahead andย executed a final 25-year Indefeasible...

US Pushes for Wireless Infrastructure Throughout West Africa

The US Trade and Development Agency has launched an...

Dig Once Policy in Ghana May Lower Fibre...

In an endeavour to accelerate broadband deployment and enhance...

The U.S. telecom sector is bolstering its cybersecurity efforts to coordinate with the creation of a new private ISAC by U.S. Telecom giants to combat AI-enabled cyberattacks and state-sponsored espionage campaigns as well as emerging risks to the nationโ€™s communications infrastructure.

It is well to be noted that some of the nationโ€™s largest telecommunications providers developed the Communications Cybersecurity Information Sharing and Analysis Center, or C2 ISAC, in order to establish a more private environment for exchanging cybersecurity intelligence. Founding members consist of AT&T, Charter, Comcast, Cox, Lumen, T-Mobile, and Verizon as well as Zayo. The chief information security officers of these companies will be members of the organisation’s board.

The private ISAC has a new executive director,ย Valerie Moon, who is theย former senior official with responsibilities for the Cybersecurity and Infrastructure Security Agency โ€“ CISA as well as the Cyber Division of the FBI.

As per the chief security officer at T-Mobile and also aย board member of the C2 ISAC, Mark Clancy,ย the private ISAC was designed for the transforming threat environment.

โ€œThe main driver for us is our recognition that the threat environment has evolved, and we as a sector and private entities need to evolve and really keep up with the pace and velocity at which thatโ€™s happening,” Clancy said in a conversation with the Cybersecurity Dive.

Clancy said theย response of the industryย to Salt Typhoon showed telecom companies the necessity for more direct collaboration. He added, โ€œThe need for us to collaborate on a private-to-private basis really became amplified.”

The Telecom Industryโ€™s Rapid Path to Intelligenceย 

The telecom industry has established information-sharing efforts via the Communications ISAC, or National Coordinating Center for Communications, but that group is different from most ISACs since it is embedded in the federal government within theย CISA, as opposed to being a separate private entity.

That government connection, Mr Clancy said, made some telecom companies cautious about divulging confidential cybersecurity intelligence.

He said, “There’ve been concerns and hesitations about it.”

The private ISAC by U.S. Telecom giants hopes to address those issues by restricting engagement to industry members and prohibiting government agencies from accessing its internal communication channels. Organisers hope that this structure encourages a freer flow of threat intelligence at earlier phases of investigations between companies.

โ€œWhen you have public-sector entities involved, thereโ€™s more review and deliberation about what gets put into that channel,โ€ opinedย Clancy, who noted the updated arrangement allows companies to be a bit more raw and upfront in terms ofย sharing information.

Over time the telecom operators felt they had grown too conservative about sharing information by means of the current Communications ISAC. Companies also often withheld lower-level threat signals that were later found to be tied to larger offensive campaigns, said Clancy.

He further said, โ€œWe were being too restrictive in what we were sharing,โ€ย adding that some supposedly isolated activity was “in fact connected to bigger activity.

Moon stressed that the private ISAC is not a substitute for the current Communications ISAC. Instead, the two organisations will probably exist side-by-side, with the older one continuing to handle larger operational issues, like threats to physical infrastructure.

Moon said that “we really see this as a complementary effort. When you think about each of these companies and their adherence to ensuring that the privacy of their data is very much at the forefront of their minds, they see this as a trusted space.โ€

Private ISAC May Go Beyond Threat Sharing

Telecom sector information-sharing initiatives have already been helpful in fighting cybercrime along with network abuse. An example involved detecting SIM boxes, devices that cybercriminals typically utilise to send out large volumes of spam calls and text messages that are extremely hard to block.

T-Mobile discovered some signs of SIM box activity and exchanged them with other telecom companies so they could detect and prevent the same kind of activity on their networks.

Clancy says that malicious infrastructure is frequently hosted across multiple providers, so mitigating these threats requires coordinated action, and in order to find out whatโ€™s going on, you have got to look across both sides.

In addition to direct threat intelligence, telecom firms have swapped operational best practices and defences by means of established partnerships. Clancy recalled another telco had taught him an effective way to deal with residential proxy networks.

Clancyย said, โ€œI learned a technique for dealing with some of the residential proxy networks from another operator that was really clever. And Iโ€™m, like, Yeah, weโ€™re going to go do that.โ€™โ€

While the private ISACโ€™s immediate priority is enhancingย information sharing surrounding AI-driven cyberattacks as well as network threats, its leaders are also thinking about broader future features. Clancy said the group might one day create shared automation platforms along with collaborative technologies which would be simpler to coordinate behind theย closed doors than in regulatory structures led by governments.

The organization may also look at participating in organised cybersecurity operations like botnet takedowns, but Moon said those discussions are in their infancy.

โ€œIt just depends on what the operation is and where the authorities lie and what we are trying to accomplish,โ€ she said.

Moon said the private ISAC is indeed in its early stages,ย indicating that multiple long-term objectives are still being talked about.

Another open question is the expansion of membership. The present-day founding members are some of the biggest companies in the telecom world, but Clancy admitted they will need greater involvement to be most effective.

โ€œThere are more than eight companies in the communications sector, and so we wonโ€™t be fully effective until we increase that membership base,โ€ Clancy said.

The announcement of the private ISAC also comes amid considerable uncertainty about federal cybersecurity programs. Budget cuts and staff reductions, as well as changing priorities for government agencies, have caused many private-sector organisations to rethink how they manage their cybersecurity defence efforts.

Clancy says, โ€œObviously, whatโ€™s happening in the public sector informs what we need to do,” referencing the issues that involve government investment and agencies along with legislative processes.

He also urged the Department of Homeland Security to speed up initiatives to substitute the obsolete Critical Infrastructure Partnership Advisory Council framework that used to offer industry and government stakeholders a private venue for discussions.

The private ISAC also intends to keep in touch with federal agencies but will be autonomous. The group will share significant intelligence directly with government partners or by means of the current Communications ISAC framework, Clancy said.

โ€œWe could have a more freewheeling private-to-private conversation and we could distil the useful, important bits and push them over to the government side,โ€ he said.

Never miss a telecoms headline

The telecoms industry moves fast โ€” stay on top of it with our must-read briefings.

  • The top telecoms and technology stories, straight to your inbox
  • The biggest news, features, interviews, and analysis
  • Dedicated coverage of the key developments driving global telecoms and digital connectivity

Latest stories

Related stories

Keppel Executes IRU Agreement with Telstra International

Keppel has gone ahead andย executed a final 25-year Indefeasible...

US Pushes for Wireless Infrastructure Throughout West Africa

The US Trade and Development Agency has launched an...

Dig Once Policy in Ghana May Lower Fibre...

In an endeavour to accelerate broadband deployment and enhance...

Modernizing 5G Wireless Home Internet Service in Algeria

As the government is moving quickly to modernise the...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from any location or device.

Media Packs

Expand Your Reach With Our Customized Solutions Empowering Your Campaigns To Maximize Your Reach & Drive Real Results!

โ€“ Access the Media Pack Now

โ€“ Book a Conference Call

โ€“ Leave Message for Us to Get Back

Translate ยป