Shreffler Named Deputy Director at ISAO Standards Organization

The Information Sharing and Analysis Organization Standards Organization (ISAO SO) today announced Allen Shreffler as the new Deputy Director. Mr. Shreffler began his tenure with the ISAO Standards Organization in April of 2017 as the Director of Lifecycle Management, where he led the working groups through the development process of publishing voluntary standards and guidelines.

“Allen has worked diligently to create a dynamic production schedule for the working groups based on the needs of the entire information sharing ecosystem,” said Dr. Greg White, Director of ISAO Standards Association. “The depth and breadth of his knowledge have been valuable to our team, the organization, and to the ecosystem. His leadership will help to continue moving the ISAO SO forward as we tackle the challenges affecting the demanding landscape of information sharing.”

Mr. Shreffler served 32 years as a career Army Military Intelligence Officer, culminating as the G2 Director of Intelligence, Army Network Enterprise Technology Command (NETCOM). He led the threat intelligence production, developed and maintained cyber threat situational awareness, identified threat actors’ intent & capabilities and identified critical infrastructure for elevated protective measures to defeat threat Computer Network Exploitation (CNE).

Mr. Shreffler is a former National Security Agency, US Army War College Fellow. He served in peacekeeping operations and multiple combat tours. He has conducted intelligence support in Central and South America, Europe, Southwest, and Southeast Asia. He holds a Bachelor of Science in History and a Master of Science in Computer Information Systems Management.

“I look forward to the challenges which lay ahead for the cybersecurity information sharing community,” stated Allen Shreffler, Deputy Director of the ISAO SO. “One such challenge is developing and maintaining trust. Without trust, the “bad guys” not only have the initiative but the advantage. We must work together and trust one another to share cybersecurity information which will result in stopping the bad guys from repeating success. When we share, we force our adversaries to spend their time and resources finding new attack methods. We take their momentum and gain the advantage.”