Community Partners FAQ
Service Overview and Setup
How does the service work?
A collection device is activated on the customer network. It includes an embedded intrusion detection system that generates security alerts and collects metadata (packet headers: source and destination addresses, port, protocol, timestamp).
Do I need to buy anything?
Are there infrastructure requirements?
How much work is involved in setting up the monitoring solution?
Data Collection and Analysis
What type of data is pulled from the network for analysis?
What types of things do the analysts find?
- Malware that has bypassed preventive security measures
- Suspicious internal network activity (e.g., scanning, cryptocurrency mining)
- Criminal and nation-state scanning operations that target Internet-facing servers
- Organized crime command-and-control communications
- Indicators of compromised assets and data exfiltration
What is the PISCES data retention policy?
Data is retained for 90 days in a first-in, first-out stack.
How are security incidents reported?
Can you offer assistance in incident response?
PISCES provides limited assistance but can connect organizations with state Cyber Security Analysts or other free state resources..
Do the communities have any insight into the data?
Yes. A community liaison oversees findings and outreach, and alerts are sent to participating communities regarding suspicious activity. Community partners may request data extractions for internal investigations.
Beginning in 2026, community partners will also be given access to data from the on-premise device.
Security and Privacy
Will students be able to read emails or access sensitive content?
Do students go through a background check?
Are international students involved?
How secure is the data pulled from customer networks?
- 90-day data retention
- Physical security of the Cyber Range facility
- Network-level access controls
- Time-limited student access authorization
- Data center security monitoring
Service Agreements and Participation
How long will my jurisdiction receive this service?
Jurisdictions with fewer than 150 employees receive the service for 3-year terms. If the organization remains under this size limit, the agreement may be renewed..
What if my organization is too large?
Organizations with more than 150 employees may receive 1-2 year agreements, with the expectation that they will transition to a commercial cybersecurity solution..
Will you respond to a public disclosure request for data?
No. PISCES does not originate data and will refer any public records requests to the originating jurisdiction.
How long is my data retained?
Data is retained for approximately 90 days for forensic analysis. If agreed upon, PISCES may hold data longer for academic research purposes.
Ensuring Security and Accuracy in Student Work
By sharing access with multiple students and universities, how is information security maintained?
- Students only work with header data, not sensitive information.
- Student Analysts only work with a “view” of the data, and cannot directly access it.
- Strong network and user access controls.
- The Cyber Range and data collection devices are periodically tested by the National Guard.
- Students sign a non-disclosure agreement ensuring confidentiality.
How do we ensure the accuracy of student results?
- Students are trained to detect anomalies in header data.
- Anomalous findings are verified before being flagged as a credible threat.
- Professors review and validate findings.
- A professional cyber analyst from PISCES conducts a final review and, if needed, reports validated threats to the data-sharing partner with mitigation recommendations.
Getting Involved
How do I get involved?
Oceanic Scale
Our Impact: Strengthening Cybersecurity Nationwide
How You Can Get Involved
Public Sector Partnerships
Student Training Program
