




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
IncollaborationwithGlobalResilienceFederationPartnershipagainstCybercrimeTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefenceCOMMUNITY PAPERNOVEMBER 2022Cover:MarsYu,GettyImages–Inside:GettyImagesContentsForewordExecutivesummaryIntroduction1MakinginformationsharingaC-suiteprerogative2Managingcomplianceandregulatoryconcerns3Defining“sharing”onapracticallevelConclusionContributorsDisclaimerThisdocumentispublishedbytheWorldEconomicForumasacontributiontoaproject,insightareaorinteraction.Thefindings,interpretationsandconclusionsexpressedhereinarearesultofacollaborativeprocessfacilitatedandendorsedbytheWorldEconomicForumbutwhoseresultsdonotnecessarilyrepresenttheviewsoftheWorldEconomicForum,northeentiretyofitsMembers,Partnersorotherstakeholders.?2022WorldEconomicForum.Allrightsreserved.Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,includingphotocopyingandrecording,orbyanyinformationstorageandretrievalsystem.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 2November2022 TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefenceForewordCharlesBlaunerMichaelDanielJeremyJurgensSpecialAdviser,GlobalPresidentandChiefExecutiveManagingDirector,ResilienceFederationOfficer,CyberThreatAllianceWorldEconomicForumWhyarewestilltalkingaboutcyberthreatinformationThispaperalsoaddressestheseproblems.Itlayssharing?Itisnotacontroversialtopic.Cybersecurityoutapractical,three-stepmethodforovercomingprofessionalsalmostuniversallysupportincreasedthebarrierstosharing,focusingontheorganizationalinformationsharing.Scoresofreportshaveendorsedstructuresneededtomakesharingpracticalandtheconcept,andgovernmentpoliciespromotetheacceptable.Followingthepaper’sframeworkwillidea.Entireorganizationsexisttoenableit.Infact,enablebusinessestochangetheirbehaviourandtheconsensusoninformationsharingisremarkableincreasetheirsharingtomeaningfullevels.foritsconsistencyanddurability.Yet,despitethisconsensus,thelevelofcyberthreatinformationBusinessesneedtoadoptthepaper’sframeworksharingremainsinsufficient.Cleary,ifeveryoneagreesbecauseincreasedinformationsharingatthethatweshoulddosomething,butmanyorganizationsorganizationallevelcreatesmultipliereffectsdonot,weneedtoexaminetheimpedimentstoacrossthedigitalecosystem.Forexample,severalactionmoreclosely.Mostimportantly,weneedtoorganizationshavecometogetherthroughthethinkaboutthetopicdifferently.WorldEconomicForumCentreforCybersecuritytosupportaprojectcalledtheCybercrimeAtlas.ThisThispaper,“TheBusinessImperativeofCybereffortcombinesinformationfromwidelydisparateInformationSharingforOurCollectiveDefence”,sourcestodevelopabetterpictureofthecybercrimeprovidessuchanalternativeperspective.Critically,ecosystem,frommalwaredevelopmenttoitdoesnotmakethecaseforinformationsharingdistributionnetworkstomoneyflows.Thedifferentbasedonaltruismorpatriotismorontechnical“maps”orviewsderivedfromthesharedinformationgrounds–traditionalargumentsforincreasedwillenablethemuchmoreeffectivedisruptionsharing.Instead,itmakesthecasebasedonofmaliciouscybercriminalactivity.Withouttheeconomics.Intoday’sworld,ifabusinesswantsunderlyingsharedinformationfrommultiplesources,tothrive(orevensurvive),thenitmustsuccessfullytheproject’sanalysiswouldnotbepossible.manageitscyberrisk.Inturn,effectiveriskmanagementrequirescyberthreatinformationInformationsharingwillneverbeeasy.Itwillalwayssharing.Bytyinginformationsharingtoabusinessrequiresustainedresources,commitmentandimperative,thispaperusesalanguagethatsupport.However,oncebusinessesgetintothebusinessleadersunderstandandregularlyactupon.habit,oncethispracticebecomesthenorm,wewillwonderhowanyoneeverfunctionedanyotherOfcourse,legalissues,culturalbarriersandanway.Then,wecanfinallystartmanagingourcyberunclearreturnoninvestmentcanstillhindersharingriskeffectively–andstoptalkingaboutcyberthreatevenifbusinessleadersrecognizethermationsharing.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 3ExecutivesummaryTrueinformationsharingisfoundationaltoclosingthegapbetweenattackersanddefenders,soitisimperativetomakeitareality.Toensuretherightlevelofcybersecurity,cooperationbetweenthepublicandprivatesectorsisabsolutelycrucial.InformationSharingandAnalysisCentrescreateaplatformforsuchcooperationintermsofsharinginformationaboutrootcauses,incidentsandthreats,aswellassharingexperience,knowledgeandanalysis.EuropeanUnionAgencyforCybersecurityThispaperprovidesabriefdiscussionofthreekeystepstowardsclosingtheattacker-defendergap:MakinginformationsharingaC-suiteprerogativeManagingcomplianceandregulatoryconcernsDefining“sharing”onapracticallevelThesethreestepsmustbeimplementedinconcerttoachievetrulyproductiveinformationsharing,butitisaworthwhileendeavourgiventhealarmingaccelerationofattacks,andtherelativestagnationoftheprogressofdefendersbycomparison.Inaddition,thispaperprovidesthefollowingunderstandingsasthefoundationuponwhichthecaseforinformationsharingrests:–Cyberthreatstodayhaveescalatedtothepointwheretheycanposeanexistentialrisktoacompany,disruptnational/globalcriticalinfrastructureandcausethelossoflife.
–Forenterprisestohaveanychanceofsuccessfullydefendingthemselves,theymustacceptandadoptaphilosophyofcollectivedefence.Cyberinformationsharingisatthecoreofanycollectivedefencestrategy.–Informationsharingisnotnew,anditisdemonstrablynotacompetitiveissue.–Legalprocessesandemergingtechnicalsolutionsexistforrealandperceivedregulatoryandprivacychallenges.–Achievingtruecyberinformationsharingisabusinessprerogativeand,aswithanybusinesspriority,successrequirestheactivesupportandengagementofC-suiteexecutives.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 4IntroductionTohaveanychanceofsuccessfullydefendingthemselves,enterprisesmustacceptandadoptaphilosophyofcollectivedefence.Cyberinformationsharingisatthecoreofanycollectivedefencestrategy.Inthespringof1998,USPresidentClinton’sadministrationwasconcernedwiththerisingtideofhostilecyberactivityandthepotentialforthatactivitytoharmcriticalinfrastructureintheUnitedStates.Inresponse,theWhiteHouseissuedPresidentialDecisionDirective63:CriticalInfrastructureProtection.ThenTreasurySecretaryRobertRubinsummonedthechiefinformationsecurityofficers(CISOs)ofleadingfinancialinstitutionstoWashingtontodiscussanindustryresponse.Workbytheindustryyieldedonekeyconclusion:firmsthattraditionallyarecompetitorsinbusinessneedtoshifttheirunderstandingofcompetitiontotheviewpointofindustryversuscriminalorganizationsandnation-stateactors.Ascriminalorganizationsaresophisticatedandhighlycollaborative,adoptingaviewofcollectivedefenceisthemosteffectiveposture.Cyberinformationsharingisatthecoreofthatdefence.Withthisrealization,theUSFinancialServicesInformationSharingandAnalysisCenter(FS-ISAC)wasborn.TheideaoftheISAChasinmanywaysbeenagreatsuccess.TheFS-ISAChasthousandsofbankssharinginformation,makingthemmoresecureandmoreresilient.Othersectorshavealsobenefitedfrominformation.In2014,theFS-ISACestablisheditsSectorServicesdivision,whichsupportedthedevelopmentofsharingorganizationsbasedontheFS-ISACmodel.Thedivisionhelpedbuildcommunitiesinlegal,energy,retailandothersectors.Iteventuallyspunouttobecomethe
non-profitGlobalResilienceFederationthatnowmanagesandsupports17sharingcommunities.Internationally,InformationSharingandAnalysisCentres(ISACs)ortheirequivalentscannowbefoundaroundtheworld,workingindependentlyorwithgovernmentsupport.Asaresultoftheirefforts,membercompaniesarenowbetterpreparedthanevertodefendthemselves.Butatthesametime,thelevelofrisktoindustryhasneverbeenhigher.InthetwodecadessincethecreationofthefirstISACs,thechallengeshavegottenmateriallyworse.Theworld’scollectiverelianceonservicesdeliveredinrealtimeviatheinternethasexposedcriticaloperationalprocessestowholenewattackvectorsand,inmanycases,thecapabilitiesofmaliciousactorshaveoutpacedthoseofthedefenders.Inaddition,theseactorshaveadoptedmanynation-statestyletechniquesandhavecreatedhighlydevelopedcollaborativemarketplacesforattacktools.Defendershavebeenleftshorthandedduetoskillshortagesandalackofcollaboration,aweakpositionexacerbatedbytheacceleratingpaceoftechnologicalchange.Bymakinginformationsharingapartofleadershippriorities,byunderstandingandrespondingtocomplianceandregulatoryconcerns,andbymoreclearlydefiningonapracticallevelwhatsharingmeans,achievinganinformation-ledapproachtocybersecuritybecomesanachievableandnecessarybusinessprerogative.Topreventcybercrimeandreduceitsimpactonindividualsandbusinesses,public-privatecooperationisessential.Movingbeyondreportingtorealinformationanddatasharingbetweencompaniesandpublicagenciesistheonlywaytoidentifyandunderstandthethreatandacttocounterit.INTERPOL’sProjectGatewayoffersalegalframeworkforprivateentitiestoshareinformationandcollaboratewiththeOrganization.UnderpinnedbyINTERPOL’suniqueglobalplatformandrangeoftools,thiswillenabletheenhancedaggregationofdataandthreatanalysisandresultinmoretargetedandeffectiveoperations.”JürgenStock,Secretary-General,InternationalCriminalPoliceOrganization(INTERPOL)TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 5MakinginformationsharingaC-suiteprerogativeCybersecuritycannotbeaddressedsolelyasatechnicalissueandmustbemanagedasamaterialbusinessrisk.Atthe2015FinancialServicesRoundtablefeaturingthelargestintegratedfinancialservicescompaniesintheUnitedStates,bankCEOsdiscussedsystemicriskstotheirfirmsandtheindustry.Theyagreedthattheimpactthatcyberincidentscouldhaveonoperationalresiliencywasatoprisk.Thepotentialofacyberattacktodisruptcriticaloperations,puttingthebanks,theircustomersandtheglobalfinancialsystematrisk,wasmaterialandgrowing.TheCEOsacknowledgedthreekeyfacts:Theadversarywasgettingmoresophisticatedandwashighlycollaborative.Despitethesignificantinvestmentsbeingmade,thebankswerefallingfartherbehind.Thatmeantthestatusquowasnotacceptable.
Ahigherlevelofcollaborationandcollectivedefenceamongthebankswasrequired,aswasrealengagementwithgovernmentandothercriticalsectorstoprotecttheirfirmsandtheglobalfinancialsystem.TheCEOsdidnotjusttalkabouttheissue;theypersonallyengagedwithgovernmentofficialsandputtheirmoneyandstaffbehindaremedy,collectivelyfundingthecreationoftheUSFinancialSystemicAnalysis&ResilienceCenter(FSARC),nowtheAnalysis&ResilienceCenter(ARC).Thechallengesassociatedwithcyberattacksandthefinancialfraudstemmingfromsuchincidentsarebiggerthananyoneinstitution,andthisissomethingthefinancialsectormustfacetogether.Wearestrongerandmoreresilientwhenweworkcollectivelytounderstandtheevolvingtacticsofcyberadversariesandtodeepenthelayersofdefenceagainstsuchattacks.BillNelson,PresidentandChiefExecutiveOfficer(2006-2018),FS-ISACTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 6Theworldhasseenasignificantriseinsophisticatedcyberincidentsoverthepastfewyears,rangingfromtheSolarWindsandColonialPipelineattackstouncountableransomwareincidents.Whileaspectsoftheeventsarenotnew(disclosureofdata,theftofmoney),theirscaleandescalationhaveheightenedthefocusoncybersecurityandoperationalresiliencybycorporateleadersineverysectoroftheeconomy,membersofthemediaandgovernmentofficials.Thesilverliningtotheincreasedcyberthreatisagrowingunderstandingthatabadcyberdaycanposeanexistentialthreattoacompany.Cybersecuritycannotbeaddressedsolelyasatechnicalissueandmustbemanagedasamaterialbusinessrisk.Thisrealizationhasamplifiedthefocusofmanagementteamsandboardsofdirectors.ThiscombinationofincreasedfocusandcollectivevulnerabilityoffersanopportunityforCISOstoengagetheirC-suitestoseektheiractivesupporttoenhancecollaboration,betterdefendandprotectorganizationsagainstthesethreats,andimprovethesecurityandresiliencyofthecollectiveecosystem.OnespecificactionaCISOcantaketobetterengagewithseniorexecutivesistoscheduleacyberthreatinformationbriefingfortheirC-suiteexecutivesandboardofdirectorswiththeirrelevantlawenforcement/governmentalagency.PresidentBiden’s12May2021ExecutiveOrderonImprovingtheNation’sCybersecuritystartswiththeneedforbettercyberinformationsharing.
TheEuropeanUnionAgencyforCybersecurity(ENISA)statesonitswebsitethat“EuropeanlegislationliketheNISDirectiveandtheCybersecurityActnourishthecreationofsectoralISACsandpublic-privatepartnershipswithintheEU”.TheEU’sDigitalOperationalResilienceActalsoproposestospecificallydevelopinformationandintelligencesharingprotocols.Theprivatesectorshoulddriveengagementininformationcollaboration.Thiscanseemunnaturalincompetition-drivenbusinesses,buthistoryhasdemonstratedthatcybersecurityisneitheracompetitivenorananticompetitiveissue.Mutualsuccessrequiresawillingnesstoworktogether.Anactiveinterestincollaboratingoperationallyisnecessarytoshareobservations,lessonslearned,bestpracticesandintelligenceinordertoprotecttheenterprise,itsclientsandtheecosystem.Asaresult,whencompanyleadersmakesharingarealpriority,ithasachancetosucceed.Incontrast,informationsharingeffortsoftenwitherwithoutsustainedsupportfromthetop.Effectivesharingrequirescontinuoussupport;theCEOandotherseniorcompanyofficialsmustmakecyberthreatinformationsharinganongoingpriorityforittobeimpactfulandsustainable.Aplatformoftrustandcommunicationtofacilitateinformationsharingamongsectorsandbusinessesisnecessarytoshareactionableinsightswithotherstakeholdersforsituationalawareness,andtodetectandrespondtocyberthreatspromptly.CyberSecurityAgencyofSingaporeTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 7ManagingcomplianceandregulatoryconcernsSharingagreed-uponinformationiscertainlymorebeneficialthanharmfultocompanies.Despitetheimportanceofsharing,neitherthepublicsectornortheprivatesectorisactingquicklyenough.Whataresomeofthefactorsimpedingprogress?Oneisthatitmaybedifficulttoshiftfromacompetitivetoacollectiveperspective;safeguardingcompanyinformationisingrainedtosuchanextentasthestatusquothatsharingmayseemantitheticaltogoodbusinesspractice.WiththeproperC-suitesupport,however,thisbarriercanbeovercome.Otherbarriersraisedoftenrelatetotheprotectionofintellectualpropertyandproprietaryinformation,andtheperceivedlegal/regulatory/compliancebarrierstosharing.Yet,organizationscanaddressconfidentialityandbalancetheprotectionofproprietaryinformationwithtriedandtestedsharingprotocolsthatdonotrequirebusinessestodivulgesensitivematerial.Giventhesechallenges,CISOsmustworkwiththeirlegalandcompliancepartnerstohelptheirorganizationsovercomethebarriersandimproveinformationsharing.LegalcounselscanworkwithCISOsoncyberinformationsharinginthefollowingkeyareas:
DefiningthetermsandconditionsIntheabsenceofgovernmentaldirectivesoncybersecurityinformationsharing,itisuptocorporatelegaldepartmentstodeterminethe“termsandconditions”whenenteringintocollaborativeagreements.Someoftheserightsandobligationsmayinclude:–Ensuringrulesofinformationsharingthataccountfordataresidencyandcross-borderissues–Safeguardingconfidentiality,throughtheuseofnon-disclosureagreements–Complyingwithexistingregulatoryrequirements–Definingwhoreceivesthedataandwhattheyareallowedtodowithit–Determiningthemostsecurewayofprovidingcross-companydataThetypeofinformationthatissharediscrucialtooffsettingthisissue.Ifitisnuanced,actionableandreadilyavailabletosecurityteams,andparticularlywhenthecollaborationwithlawenforcementisTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 8strong,sharingagreed-uponinformationiscertainlymorebeneficialthanharmfultocompanies.Termsofsharingshouldbewrittenintotheoriginalcontractswhenformingacollaborativenetwork.Wherepossible,leveragingexistingagreementssuchasthosewiththevariousISACsandtheUK’sCyberDefenceAlliance(CDA),amongothers,isadvisable.Ideally,governmentswouldprovidethemainguidanceontheseprocesses.However,intheabsenceofclearregulation,creatingrules,up-fronttermsandotherbestpracticeswillhelpfacilitatesharing.BuildingatrustframeworkAlthoughcontractscanofferaroadmaponhowtoproceed,trustplaysacrucialroleinthesuccessofanycollaborativeeffort.Itispossibletobuildtrustwithinacoalitionbysettingstandardsandrulesofbehaviourthateverypartnercanagreeupon.OneexampleistheTrafficLightProtocol,asetofdesignationscreatedtofacilitategreaterinformationsharing,adoptedbymostISACs.Tobeuseful,aminimumrequirementmaybenecessarytoensurethatcompaniesarenotgainingfromacollaborativeeffortwithoutcontributingtheirownresources.
Recommendationsincludelayingoutcleargroundrulesforconfidentialityandanonymizingdatatoprotecttheprivacyofindividuals.Leveragingemergingtechnologycapabilitieswherepossibletoprotectpersonallyidentifiableinformation(PII)isalsoadvised.Atthesametime,itisimperativetoacknowledgethatnotalldataishighlysensitivePII.Acleardataidentificationsystemcanhelptoalleviatethispressure.Althoughinformationsharingentailscompliancecosts,bettersecuritywillbenefiteverybusinessinthelongterm.Private-sector-ledcross-sectorinformationsharingshouldcreateanimpetusforclearerlegislationonsharingacrossborderswithdataresidencyandsovereigntyimplications.Expandingcooperationbenefitseveryone,andacodeofbestpracticesbuildsastrongercoalitiontoprotectcollectivesecurity.Untilgoverningbodiespasslegislation,companiesmustcontinuetodependontheirlegaldepartmentstocreateapathforward,basedonestablishedprecedent.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 9Defining“sharing”onapracticallevelItisessentialtorethinkhoworganizationsengageincollaborationandtherequirementstomakeitsuccessful.Evenifanorganizationfollowsalltheabove-mentionedrecommendations–recognizingthevalueofinformationsharing,obtainingitsCEO’sapprovalandresolvingtheGeneralCounsel’squestions–makinginformationsharingworkcanstillprovechallenging.Industryandgovernmentpartnersthathavepreviouslydiscussedpartnershipsincybersecurityhaveprimarilyfocusedoninformationsharingasatransaction.However,thesharingneedstobecontinuousandperpetual–activeduringbothheightenedanddecreasedthreatperiods.Tobenefitallthoseinvolved,collaborationshouldoccurintrustedphysicalandvirtualenvironmentsandshouldbeeasierandmorestreamlined,withclarityonentrypointsaswellasrolesandresponsibilities.Bycollaboratingwithinaknownandtrustedcommunity,“circlesoftrust”areestablished.AsdescribedbyChrisJohnsonetal.inNISTSpecialPublication800-150entitled“GuidetoCyber
ThreatInformationSharing”,“organizationscanleveragethecollectiveknowledge,experience,andcapabilitiesofthatsharingcommunitytogainamorecompleteunderstandingofthethreatstheorganizationmayface.”Usingthisknowledgeallowsanorganizationtomakebetterinformeddecisions,andcreatebetterthreatdetectiontechniquesandriskmitigationstrategies.“Bycorrelatingandanalyzingcyberthreatinformationfrommultiplesources,anorganizationcanalsoenrichexistinginformationandmakeitmoreactionable.”Fourstepscanshifttrueinformationsharingfromconcepttoreality:–Preparingthecompany–Identifyingpartners–Understandingwhattoshare–ProtectingprivacyTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 10Preparingthecompany–Determininginformationrequirements–Thechallengestemsfromthesheervolumeofinformation.Tosortthroughtheoceanofintelligence,organizationsneedtodeterminetheirinformationrequirementsbasedonthecybersecuritydecisionstheircompanyneedstomake.–Selectingtherighttypeofinformation–Onceabusinessunderstandsitscybersecurityusecases,itthenmustselecttheinformationthatsupportsthoseusecases.Identifyingpartners–Allorganizationswishtoreceiveintelligencebutfortheretobeanyrelevantinformationtoreceive,someonehastoshareitinthefirstplace.Aswiththeinformationconsumed,theinformationanorganizationsharesbackandhowitdoessodependonitssituation.–Sharingbackdoesnotmeananorganizationmustshareeverything,butitdoesrequiresharingtobebidirectional.–Sharingnetworksneedtosupportmultipletypesofsharingpartnerships.FIGURE Asamplesharingecosystem
–Manytypesofinformationexist,rangingfromtechnicalindicatorstothreatactorprofilestodefensivemeasuresandbestpractices.–Integratingsecurityactionsinbusinessactivities–Thisstepinvolvesintegratingtheinformationinthefirm’ssecurityandbusinessdecisions.–Ensuringsustainability–Weavinginformationsharingintotheday-to-dayactivitiesofcybersecuritystaffandprovidingregularfundingarecriticalforsuccess.–Thefastestwaytoachievesharingistobuildontopofanexistingnetworkwheneverpossible.–Sharingisatitsmostimpactfulwhenitisbuiltoncirclesoftrust.WithintheISACs,circlesoftrustareoftenformedbetweentheleadersofthesecurityoperationsandintelligenceteamsfromthevariousparticipatingcompanies.–Onekeyrecommendationistothinkaboutcirclesoftrustoccurringatvariouslayersofanorganization,goingbothdeeperwithintheorganizationbutalso,andmorecritically,higherwithinitsothatCISOsandCIOsarealsotalkingtoeachother.CompanyA’sclientsSectorISACOtherISACsCompanyBCompanyALawenforcement&governmentCompanyA’svendors&partnersISAC=InformationSharingandAnalysisCentreSource:GlobalResilienceFederation TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 11Understandingwhattoshare–Thegoalsofsharingmustnotbearbitrary.Theyshouldbedeterminedbywell-definedusecasesthatfallintooneofthefollowingcategories:–Protectingthefirm’sabilitytooperatesafely–Protectingthefirm’sclients–Protectingthesafetyandsoundnessofthe“system”–Protectingthenation’scriticalinfrastructure
–Often,theperfectistheenemyofthegood,asorganizationsassumethatbecausesomeinformationistoosensitivetoshare,theycannotshareanythinguseful.–Someinformationisalmostalwaysbetterthannoinformation.–Knowingwhatmayproveusefultoanothercompanyisusuallyimpossible,soerringonthesideofsharingmakessense.Protectingprivacy–Akeyconsiderationwhensharingishowtosharewhilecomplyingwiththevariousinternationalprivacyregimes.–Anewbroadrangeoftechnologiescalled“privacy-enhancingtechnologies”(PETs)hasemergedtoaddressthischallenge.–PETsenableorganizationstosharedatawhilepreservingprivacy,securityandregulatorycompliance.
–AvarietyofPETsareavailabletoday,includinghomomorphicencryption,securemultipartycomputationanddifferentialprivacy,eachofwhichofferssolutionstodifferentcollaborationchallenges.–Inparticular,homomorphicencryptionhasbecomepopularinorganizationsthatendeavourtocollaboratewiththeirecosystemonsensitivedatawhileprotectingtheirbusinessinterestsandcomplyingwithdataprivacyregulations.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 12ConclusionTheescalatingcyberthreatenvironmentpresentsariskofoperationaldisruptiontoeveryenterprisetoday.Attheextreme,attackscanposeanexistentialthreattoacompanyor,worse,canleadtothelossoflife.Tohaveanychanceofsuccessfullydefendingthemselves,enterprisesmustacceptandadoptacorephilosophyofcollectivedefence;truecyberinformationsharingisatthecentreofacollectivedefencestrategy.Informationsharingisvitallyimportantforaneffectiveapproachtocybersecurity.IntheUnitedStates,forexample,theCybersecurity&InfrastructureSecurityAgencyand,intheEU,ENISAbothhaveidentifiedinformationsharingasessentialtoimprovingtheworld’scybersecurityriskposture.
Aswithanybusinesspriority,successreliesontheactivesupportandengagementoftheC-suite,andtraditionalreluctancestemmingfromcompetitive,regulatorycomplianceandprivacyperspectivesmustbeputaside.Achievingtruecyberinformationsharingisabusinessprerogativethatrequiresanappetiteforcollaborationandswiftactionbyallorganizations.Cyberistheultimateteamsport,andweneedtocreateanenvironmentwherethechallengesexperiencedbyonecompanyleadtothebenefitofmanycompanies.Intelligencesharingisacriticalcomponentinourabilitytoachievethatgoal.”Admiral
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 人教版(2024)七年級英語下冊Unit 8 學(xué)情調(diào)研測試卷(含答案)
- 第12課《四季循環(huán)》教學(xué)設(shè)計-2023-2024學(xué)年科學(xué)五年級下冊蘇教版
- 酒店電纜基礎(chǔ)施工方案
- 2025年新高考地理全真模擬試卷5(含答案解析)
- 2025年中考物理二輪復(fù)習(xí):選擇題 實驗題 能力提升練習(xí)題(含答案解析)
- 廁所建造合同范本
- 公園管護合同范例
- 班級氛圍營造的實踐方法計劃
- 品牌在市場競爭中的演變與適應(yīng)計劃
- 企業(yè)借貸抵押合同范例
- 足球迷互動活動策劃與執(zhí)行策略
- 公司內(nèi)部辦公用品采購預(yù)算表
- 四川省南充市2025屆高三下學(xué)期高考適應(yīng)性考試(二診)語文試題(含答案)
- 湖北省2025屆高三下學(xué)期2月調(diào)考語文試題及參考答案
- 2025年湖南國防工業(yè)職業(yè)技術(shù)學(xué)院單招職業(yè)技能測試題庫完整版
- ESC+2024+心房顫動(房顫)管理指南解讀
- 2025年《地陪導(dǎo)游服務(wù)程序》公開課標(biāo)準(zhǔn)教案
- 2025年國電投核能限公司招聘高頻重點模擬試卷提升(共500題附帶答案詳解)
- 高中英語新課程標(biāo)準(zhǔn)解讀課件
- 三級機動車駕駛教練員職業(yè)資格理論題庫(匯總版)
- 腰果酚涂料的研究進展
評論
0/150
提交評論