In a significant move signaling a shift in the public-private security paradigm, a group of U.S. corporate giants has formed the Alliance for Critical Infrastructure (ACI). This new coalition, which includes JPMorgan Chase, Mastercard, AT&T, and Berkshire Hathaway Energy, aims to take a leading role in protecting the nation's essential infrastructure. The formation is driven by a perception of a retreating federal government role and dwindling faith in its capacity to lead cybersecurity partnerships. The ACI will focus on enhancing cross-sector coordination, developing shared risk models, and creating response plans for complex, multi-faceted crises, effectively taking ownership of a problem they believe they can no longer outsource to Washington.
The ACI is not a formal regulatory body but a private-sector-led initiative. Its power comes from the influence and operational control its members wield over vast swaths of U.S. critical infrastructure.
The alliance is composed of, and will primarily affect, operators of critical infrastructure in the United States. Key founding members include:
The ACI is an evolution of the Tri-Sector Executive Working Group, and its work is intended to benefit all 16 critical infrastructure sectors defined by the U.S. government.
As a voluntary, private-sector body, the ACI does not impose legally binding compliance requirements. Instead, it will produce guidance, white papers, and best practices that its members and other organizations can adopt.
The formation of the ACI has several significant impacts:
While not a regulatory body, organizations can align with the ACI's goals by taking the following steps:
The Alliance for Critical Infrastructure (ACI) was officially launched.
The ACI's formation and goals are detailed in a public report.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.