Eight major US telecommunications companies have joined forces to create a unified defense against increasingly sophisticated cyber threats targeting the nation’s communications infrastructure. The coalition includes industry giants AT&T, Verizon, T-Mobile US, Charter Communications, Comcast, Cox Communications, Lumen Technologies, and Zayo.
The new organization, called the Communications Cybersecurity Information Sharing and Analysis Centre (C2 ISAC), was announced as a non-profit specifically designed to counter AI-accelerated threats that pose risks to America’s communications backbone.
This coalition represents a significant shift in how the telecommunications industry approaches cybersecurity. Traditionally, operators have largely handled cyber threats individually, but the growing sophistication of attacks – particularly those enhanced by artificial intelligence – has made collective defense a necessity rather than an option.
The timing of this announcement is particularly relevant given the recent surge in state-sponsored cyber attacks and AI-powered threats targeting critical infrastructure. US telecommunications networks have faced numerous high-profile security incidents in recent years, highlighting vulnerabilities that could have national security implications if left unaddressed.
The C2 ISAC will be governed by a board of directors consisting of the chief information security officers from each founding company. AT&T’s CISO Rich Baich will chair the organization, while Valerie Moon will serve as executive director. Moon brings significant expertise to the role, with previous leadership positions at the Cybersecurity and Infrastructure Security Agency, the FBI, and other key cybersecurity organizations.
The coalition’s primary mission centers on developing faster, more coordinated responses to cyber threats. As Baich explained, “Cybersecurity threats are more sophisticated and persistent than ever. With Valerie Moon serving as executive director, the C2 ISAC is well positioned to expand trusted collaboration across the communications sector and help members address emerging risks.”
The founding companies acknowledged that no single operator has complete visibility into every threat or the resources to address every risk independently. The C2 ISAC aims to address these limitations through several key approaches:
- Pooling real-time threat intelligence across all member organizations
- Sharing technical expertise and best practices
- Coordinating defense strategies across the sector
- Raising overall resilience of the communications infrastructure
This collaborative approach could significantly improve the industry’s ability to detect and respond to threats before they cause widespread damage. By sharing information about attack patterns, vulnerabilities, and successful defense strategies, member companies can benefit from collective knowledge that far exceeds what any individual organization could develop alone.
The focus on AI-accelerated threats reflects the changing nature of cybersecurity challenges. Attackers are increasingly using artificial intelligence to automate and enhance their capabilities, making traditional defense approaches less effective. The telecommunications sector, as critical infrastructure, has become a prime target for both cybercriminals and nation-state actors.
The C2 ISAC plans to begin formal operations in June 2026, with Moon overseeing daily operations while the board of CISOs provides strategic direction. The organization’s success will likely depend on how effectively it can facilitate information sharing while maintaining the competitive relationships between member companies.
This initiative also aligns with broader government efforts to strengthen critical infrastructure cybersecurity. Federal agencies have been pushing for greater collaboration between private sector companies in key industries, recognizing that cyber threats often transcend individual company boundaries.
The formation of C2 ISAC could serve as a model for other industries facing similar cybersecurity challenges. If successful, it may encourage the creation of similar collaborative defense organizations in sectors like energy, finance, and transportation, all of which face comparable threats to their critical infrastructure.
