While the sharing of information is important, Funding for research into methods for immediate breach awareness the minute they occur is a critical component for detection and mitigation. There is technology available that can spot and identify attempts at intrusion at the source. As we know, i.e. OPM and others had been breached long before there was a discovery of intrusion. Much remains to be accomplished toward protection of key assets by creating mechanisms for immediate intrusion detection and perpetrator identification. It's critical enough when there is a breach, its even worse when that breach is not detected for long periods of time. Technology exists to mitigate this challenge.