世界經(jīng)濟論壇-網(wǎng)絡(luò)信息共享對我們集體防御的商業(yè)重要性(英)-2022.11-16正式版_第1頁
世界經(jīng)濟論壇-網(wǎng)絡(luò)信息共享對我們集體防御的商業(yè)重要性(英)-2022.11-16正式版_第2頁
世界經(jīng)濟論壇-網(wǎng)絡(luò)信息共享對我們集體防御的商業(yè)重要性(英)-2022.11-16正式版_第3頁
世界經(jīng)濟論壇-網(wǎng)絡(luò)信息共享對我們集體防御的商業(yè)重要性(英)-2022.11-16正式版_第4頁
世界經(jīng)濟論壇-網(wǎng)絡(luò)信息共享對我們集體防御的商業(yè)重要性(英)-2022.11-16正式版_第5頁
已閱讀5頁,還剩11頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

IncollaborationwithGlobalResilienceFederationPartnershipagainstCybercrimeTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefenceCOMMUNITY PAPERNOVEMBER 2022Cover:MarsYu,GettyImages–Inside:GettyImagesContentsForewordExecutivesummaryIntroduction1MakinginformationsharingaC-suiteprerogative2Managingcomplianceandregulatoryconcerns3Defining“sharing”onapracticallevelConclusionContributorsDisclaimerThisdocumentispublishedbytheWorldEconomicForumasacontributiontoaproject,insightareaorinteraction.Thefindings,interpretationsandconclusionsexpressedhereinarearesultofacollaborativeprocessfacilitatedandendorsedbytheWorldEconomicForumbutwhoseresultsdonotnecessarilyrepresenttheviewsoftheWorldEconomicForum,northeentiretyofitsMembers,Partnersorotherstakeholders.?2022WorldEconomicForum.Allrightsreserved.Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,includingphotocopyingandrecording,orbyanyinformationstorageandretrievalsystem.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 2November2022 TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefenceForewordCharlesBlaunerMichaelDanielJeremyJurgensSpecialAdviser,GlobalPresidentandChiefExecutiveManagingDirector,ResilienceFederationOfficer,CyberThreatAllianceWorldEconomicForumWhyarewestilltalkingaboutcyberthreatinformationThispaperalsoaddressestheseproblems.Itlayssharing?Itisnotacontroversialtopic.Cybersecurityoutapractical,three-stepmethodforovercomingprofessionalsalmostuniversallysupportincreasedthebarrierstosharing,focusingontheorganizationalinformationsharing.Scoresofreportshaveendorsedstructuresneededtomakesharingpracticalandtheconcept,andgovernmentpoliciespromotetheacceptable.Followingthepaper’sframeworkwillidea.Entireorganizationsexisttoenableit.Infact,enablebusinessestochangetheirbehaviourandtheconsensusoninformationsharingisremarkableincreasetheirsharingtomeaningfullevels.foritsconsistencyanddurability.Yet,despitethisconsensus,thelevelofcyberthreatinformationBusinessesneedtoadoptthepaper’sframeworksharingremainsinsufficient.Cleary,ifeveryoneagreesbecauseincreasedinformationsharingatthethatweshoulddosomething,butmanyorganizationsorganizationallevelcreatesmultipliereffectsdonot,weneedtoexaminetheimpedimentstoacrossthedigitalecosystem.Forexample,severalactionmoreclosely.Mostimportantly,weneedtoorganizationshavecometogetherthroughthethinkaboutthetopicdifferently.WorldEconomicForumCentreforCybersecuritytosupportaprojectcalledtheCybercrimeAtlas.ThisThispaper,“TheBusinessImperativeofCybereffortcombinesinformationfromwidelydisparateInformationSharingforOurCollectiveDefence”,sourcestodevelopabetterpictureofthecybercrimeprovidessuchanalternativeperspective.Critically,ecosystem,frommalwaredevelopmenttoitdoesnotmakethecaseforinformationsharingdistributionnetworkstomoneyflows.Thedifferentbasedonaltruismorpatriotismorontechnical“maps”orviewsderivedfromthesharedinformationgrounds–traditionalargumentsforincreasedwillenablethemuchmoreeffectivedisruptionsharing.Instead,itmakesthecasebasedonofmaliciouscybercriminalactivity.Withouttheeconomics.Intoday’sworld,ifabusinesswantsunderlyingsharedinformationfrommultiplesources,tothrive(orevensurvive),thenitmustsuccessfullytheproject’sanalysiswouldnotbepossible.manageitscyberrisk.Inturn,effectiveriskmanagementrequirescyberthreatinformationInformationsharingwillneverbeeasy.Itwillalwayssharing.Bytyinginformationsharingtoabusinessrequiresustainedresources,commitmentandimperative,thispaperusesalanguagethatsupport.However,oncebusinessesgetintothebusinessleadersunderstandandregularlyactupon.habit,oncethispracticebecomesthenorm,wewillwonderhowanyoneeverfunctionedanyotherOfcourse,legalissues,culturalbarriersandanway.Then,wecanfinallystartmanagingourcyberunclearreturnoninvestmentcanstillhindersharingriskeffectively–andstoptalkingaboutcyberthreatevenifbusinessleadersrecognizethermationsharing.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 3ExecutivesummaryTrueinformationsharingisfoundationaltoclosingthegapbetweenattackersanddefenders,soitisimperativetomakeitareality.Toensuretherightlevelofcybersecurity,cooperationbetweenthepublicandprivatesectorsisabsolutelycrucial.InformationSharingandAnalysisCentrescreateaplatformforsuchcooperationintermsofsharinginformationaboutrootcauses,incidentsandthreats,aswellassharingexperience,knowledgeandanalysis.EuropeanUnionAgencyforCybersecurityThispaperprovidesabriefdiscussionofthreekeystepstowardsclosingtheattacker-defendergap:MakinginformationsharingaC-suiteprerogativeManagingcomplianceandregulatoryconcernsDefining“sharing”onapracticallevelThesethreestepsmustbeimplementedinconcerttoachievetrulyproductiveinformationsharing,butitisaworthwhileendeavourgiventhealarmingaccelerationofattacks,andtherelativestagnationoftheprogressofdefendersbycomparison.Inaddition,thispaperprovidesthefollowingunderstandingsasthefoundationuponwhichthecaseforinformationsharingrests:–Cyberthreatstodayhaveescalatedtothepointwheretheycanposeanexistentialrisktoacompany,disruptnational/globalcriticalinfrastructureandcausethelossoflife.

–Forenterprisestohaveanychanceofsuccessfullydefendingthemselves,theymustacceptandadoptaphilosophyofcollectivedefence.Cyberinformationsharingisatthecoreofanycollectivedefencestrategy.–Informationsharingisnotnew,anditisdemonstrablynotacompetitiveissue.–Legalprocessesandemergingtechnicalsolutionsexistforrealandperceivedregulatoryandprivacychallenges.–Achievingtruecyberinformationsharingisabusinessprerogativeand,aswithanybusinesspriority,successrequirestheactivesupportandengagementofC-suiteexecutives.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 4IntroductionTohaveanychanceofsuccessfullydefendingthemselves,enterprisesmustacceptandadoptaphilosophyofcollectivedefence.Cyberinformationsharingisatthecoreofanycollectivedefencestrategy.Inthespringof1998,USPresidentClinton’sadministrationwasconcernedwiththerisingtideofhostilecyberactivityandthepotentialforthatactivitytoharmcriticalinfrastructureintheUnitedStates.Inresponse,theWhiteHouseissuedPresidentialDecisionDirective63:CriticalInfrastructureProtection.ThenTreasurySecretaryRobertRubinsummonedthechiefinformationsecurityofficers(CISOs)ofleadingfinancialinstitutionstoWashingtontodiscussanindustryresponse.Workbytheindustryyieldedonekeyconclusion:firmsthattraditionallyarecompetitorsinbusinessneedtoshifttheirunderstandingofcompetitiontotheviewpointofindustryversuscriminalorganizationsandnation-stateactors.Ascriminalorganizationsaresophisticatedandhighlycollaborative,adoptingaviewofcollectivedefenceisthemosteffectiveposture.Cyberinformationsharingisatthecoreofthatdefence.Withthisrealization,theUSFinancialServicesInformationSharingandAnalysisCenter(FS-ISAC)wasborn.TheideaoftheISAChasinmanywaysbeenagreatsuccess.TheFS-ISAChasthousandsofbankssharinginformation,makingthemmoresecureandmoreresilient.Othersectorshavealsobenefitedfrominformation.In2014,theFS-ISACestablisheditsSectorServicesdivision,whichsupportedthedevelopmentofsharingorganizationsbasedontheFS-ISACmodel.Thedivisionhelpedbuildcommunitiesinlegal,energy,retailandothersectors.Iteventuallyspunouttobecomethe

non-profitGlobalResilienceFederationthatnowmanagesandsupports17sharingcommunities.Internationally,InformationSharingandAnalysisCentres(ISACs)ortheirequivalentscannowbefoundaroundtheworld,workingindependentlyorwithgovernmentsupport.Asaresultoftheirefforts,membercompaniesarenowbetterpreparedthanevertodefendthemselves.Butatthesametime,thelevelofrisktoindustryhasneverbeenhigher.InthetwodecadessincethecreationofthefirstISACs,thechallengeshavegottenmateriallyworse.Theworld’scollectiverelianceonservicesdeliveredinrealtimeviatheinternethasexposedcriticaloperationalprocessestowholenewattackvectorsand,inmanycases,thecapabilitiesofmaliciousactorshaveoutpacedthoseofthedefenders.Inaddition,theseactorshaveadoptedmanynation-statestyletechniquesandhavecreatedhighlydevelopedcollaborativemarketplacesforattacktools.Defendershavebeenleftshorthandedduetoskillshortagesandalackofcollaboration,aweakpositionexacerbatedbytheacceleratingpaceoftechnologicalchange.Bymakinginformationsharingapartofleadershippriorities,byunderstandingandrespondingtocomplianceandregulatoryconcerns,andbymoreclearlydefiningonapracticallevelwhatsharingmeans,achievinganinformation-ledapproachtocybersecuritybecomesanachievableandnecessarybusinessprerogative.Topreventcybercrimeandreduceitsimpactonindividualsandbusinesses,public-privatecooperationisessential.Movingbeyondreportingtorealinformationanddatasharingbetweencompaniesandpublicagenciesistheonlywaytoidentifyandunderstandthethreatandacttocounterit.INTERPOL’sProjectGatewayoffersalegalframeworkforprivateentitiestoshareinformationandcollaboratewiththeOrganization.UnderpinnedbyINTERPOL’suniqueglobalplatformandrangeoftools,thiswillenabletheenhancedaggregationofdataandthreatanalysisandresultinmoretargetedandeffectiveoperations.”JürgenStock,Secretary-General,InternationalCriminalPoliceOrganization(INTERPOL)TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 5MakinginformationsharingaC-suiteprerogativeCybersecuritycannotbeaddressedsolelyasatechnicalissueandmustbemanagedasamaterialbusinessrisk.Atthe2015FinancialServicesRoundtablefeaturingthelargestintegratedfinancialservicescompaniesintheUnitedStates,bankCEOsdiscussedsystemicriskstotheirfirmsandtheindustry.Theyagreedthattheimpactthatcyberincidentscouldhaveonoperationalresiliencywasatoprisk.Thepotentialofacyberattacktodisruptcriticaloperations,puttingthebanks,theircustomersandtheglobalfinancialsystematrisk,wasmaterialandgrowing.TheCEOsacknowledgedthreekeyfacts:Theadversarywasgettingmoresophisticatedandwashighlycollaborative.Despitethesignificantinvestmentsbeingmade,thebankswerefallingfartherbehind.Thatmeantthestatusquowasnotacceptable.

Ahigherlevelofcollaborationandcollectivedefenceamongthebankswasrequired,aswasrealengagementwithgovernmentandothercriticalsectorstoprotecttheirfirmsandtheglobalfinancialsystem.TheCEOsdidnotjusttalkabouttheissue;theypersonallyengagedwithgovernmentofficialsandputtheirmoneyandstaffbehindaremedy,collectivelyfundingthecreationoftheUSFinancialSystemicAnalysis&ResilienceCenter(FSARC),nowtheAnalysis&ResilienceCenter(ARC).Thechallengesassociatedwithcyberattacksandthefinancialfraudstemmingfromsuchincidentsarebiggerthananyoneinstitution,andthisissomethingthefinancialsectormustfacetogether.Wearestrongerandmoreresilientwhenweworkcollectivelytounderstandtheevolvingtacticsofcyberadversariesandtodeepenthelayersofdefenceagainstsuchattacks.BillNelson,PresidentandChiefExecutiveOfficer(2006-2018),FS-ISACTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 6Theworldhasseenasignificantriseinsophisticatedcyberincidentsoverthepastfewyears,rangingfromtheSolarWindsandColonialPipelineattackstouncountableransomwareincidents.Whileaspectsoftheeventsarenotnew(disclosureofdata,theftofmoney),theirscaleandescalationhaveheightenedthefocusoncybersecurityandoperationalresiliencybycorporateleadersineverysectoroftheeconomy,membersofthemediaandgovernmentofficials.Thesilverliningtotheincreasedcyberthreatisagrowingunderstandingthatabadcyberdaycanposeanexistentialthreattoacompany.Cybersecuritycannotbeaddressedsolelyasatechnicalissueandmustbemanagedasamaterialbusinessrisk.Thisrealizationhasamplifiedthefocusofmanagementteamsandboardsofdirectors.ThiscombinationofincreasedfocusandcollectivevulnerabilityoffersanopportunityforCISOstoengagetheirC-suitestoseektheiractivesupporttoenhancecollaboration,betterdefendandprotectorganizationsagainstthesethreats,andimprovethesecurityandresiliencyofthecollectiveecosystem.OnespecificactionaCISOcantaketobetterengagewithseniorexecutivesistoscheduleacyberthreatinformationbriefingfortheirC-suiteexecutivesandboardofdirectorswiththeirrelevantlawenforcement/governmentalagency.PresidentBiden’s12May2021ExecutiveOrderonImprovingtheNation’sCybersecuritystartswiththeneedforbettercyberinformationsharing.

TheEuropeanUnionAgencyforCybersecurity(ENISA)statesonitswebsitethat“EuropeanlegislationliketheNISDirectiveandtheCybersecurityActnourishthecreationofsectoralISACsandpublic-privatepartnershipswithintheEU”.TheEU’sDigitalOperationalResilienceActalsoproposestospecificallydevelopinformationandintelligencesharingprotocols.Theprivatesectorshoulddriveengagementininformationcollaboration.Thiscanseemunnaturalincompetition-drivenbusinesses,buthistoryhasdemonstratedthatcybersecurityisneitheracompetitivenorananticompetitiveissue.Mutualsuccessrequiresawillingnesstoworktogether.Anactiveinterestincollaboratingoperationallyisnecessarytoshareobservations,lessonslearned,bestpracticesandintelligenceinordertoprotecttheenterprise,itsclientsandtheecosystem.Asaresult,whencompanyleadersmakesharingarealpriority,ithasachancetosucceed.Incontrast,informationsharingeffortsoftenwitherwithoutsustainedsupportfromthetop.Effectivesharingrequirescontinuoussupport;theCEOandotherseniorcompanyofficialsmustmakecyberthreatinformationsharinganongoingpriorityforittobeimpactfulandsustainable.Aplatformoftrustandcommunicationtofacilitateinformationsharingamongsectorsandbusinessesisnecessarytoshareactionableinsightswithotherstakeholdersforsituationalawareness,andtodetectandrespondtocyberthreatspromptly.CyberSecurityAgencyofSingaporeTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 7ManagingcomplianceandregulatoryconcernsSharingagreed-uponinformationiscertainlymorebeneficialthanharmfultocompanies.Despitetheimportanceofsharing,neitherthepublicsectornortheprivatesectorisactingquicklyenough.Whataresomeofthefactorsimpedingprogress?Oneisthatitmaybedifficulttoshiftfromacompetitivetoacollectiveperspective;safeguardingcompanyinformationisingrainedtosuchanextentasthestatusquothatsharingmayseemantitheticaltogoodbusinesspractice.WiththeproperC-suitesupport,however,thisbarriercanbeovercome.Otherbarriersraisedoftenrelatetotheprotectionofintellectualpropertyandproprietaryinformation,andtheperceivedlegal/regulatory/compliancebarrierstosharing.Yet,organizationscanaddressconfidentialityandbalancetheprotectionofproprietaryinformationwithtriedandtestedsharingprotocolsthatdonotrequirebusinessestodivulgesensitivematerial.Giventhesechallenges,CISOsmustworkwiththeirlegalandcompliancepartnerstohelptheirorganizationsovercomethebarriersandimproveinformationsharing.LegalcounselscanworkwithCISOsoncyberinformationsharinginthefollowingkeyareas:

DefiningthetermsandconditionsIntheabsenceofgovernmentaldirectivesoncybersecurityinformationsharing,itisuptocorporatelegaldepartmentstodeterminethe“termsandconditions”whenenteringintocollaborativeagreements.Someoftheserightsandobligationsmayinclude:–Ensuringrulesofinformationsharingthataccountfordataresidencyandcross-borderissues–Safeguardingconfidentiality,throughtheuseofnon-disclosureagreements–Complyingwithexistingregulatoryrequirements–Definingwhoreceivesthedataandwhattheyareallowedtodowithit–Determiningthemostsecurewayofprovidingcross-companydataThetypeofinformationthatissharediscrucialtooffsettingthisissue.Ifitisnuanced,actionableandreadilyavailabletosecurityteams,andparticularlywhenthecollaborationwithlawenforcementisTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 8strong,sharingagreed-uponinformationiscertainlymorebeneficialthanharmfultocompanies.Termsofsharingshouldbewrittenintotheoriginalcontractswhenformingacollaborativenetwork.Wherepossible,leveragingexistingagreementssuchasthosewiththevariousISACsandtheUK’sCyberDefenceAlliance(CDA),amongothers,isadvisable.Ideally,governmentswouldprovidethemainguidanceontheseprocesses.However,intheabsenceofclearregulation,creatingrules,up-fronttermsandotherbestpracticeswillhelpfacilitatesharing.BuildingatrustframeworkAlthoughcontractscanofferaroadmaponhowtoproceed,trustplaysacrucialroleinthesuccessofanycollaborativeeffort.Itispossibletobuildtrustwithinacoalitionbysettingstandardsandrulesofbehaviourthateverypartnercanagreeupon.OneexampleistheTrafficLightProtocol,asetofdesignationscreatedtofacilitategreaterinformationsharing,adoptedbymostISACs.Tobeuseful,aminimumrequirementmaybenecessarytoensurethatcompaniesarenotgainingfromacollaborativeeffortwithoutcontributingtheirownresources.

Recommendationsincludelayingoutcleargroundrulesforconfidentialityandanonymizingdatatoprotecttheprivacyofindividuals.Leveragingemergingtechnologycapabilitieswherepossibletoprotectpersonallyidentifiableinformation(PII)isalsoadvised.Atthesametime,itisimperativetoacknowledgethatnotalldataishighlysensitivePII.Acleardataidentificationsystemcanhelptoalleviatethispressure.Althoughinformationsharingentailscompliancecosts,bettersecuritywillbenefiteverybusinessinthelongterm.Private-sector-ledcross-sectorinformationsharingshouldcreateanimpetusforclearerlegislationonsharingacrossborderswithdataresidencyandsovereigntyimplications.Expandingcooperationbenefitseveryone,andacodeofbestpracticesbuildsastrongercoalitiontoprotectcollectivesecurity.Untilgoverningbodiespasslegislation,companiesmustcontinuetodependontheirlegaldepartmentstocreateapathforward,basedonestablishedprecedent.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 9Defining“sharing”onapracticallevelItisessentialtorethinkhoworganizationsengageincollaborationandtherequirementstomakeitsuccessful.Evenifanorganizationfollowsalltheabove-mentionedrecommendations–recognizingthevalueofinformationsharing,obtainingitsCEO’sapprovalandresolvingtheGeneralCounsel’squestions–makinginformationsharingworkcanstillprovechallenging.Industryandgovernmentpartnersthathavepreviouslydiscussedpartnershipsincybersecurityhaveprimarilyfocusedoninformationsharingasatransaction.However,thesharingneedstobecontinuousandperpetual–activeduringbothheightenedanddecreasedthreatperiods.Tobenefitallthoseinvolved,collaborationshouldoccurintrustedphysicalandvirtualenvironmentsandshouldbeeasierandmorestreamlined,withclarityonentrypointsaswellasrolesandresponsibilities.Bycollaboratingwithinaknownandtrustedcommunity,“circlesoftrust”areestablished.AsdescribedbyChrisJohnsonetal.inNISTSpecialPublication800-150entitled“GuidetoCyber

ThreatInformationSharing”,“organizationscanleveragethecollectiveknowledge,experience,andcapabilitiesofthatsharingcommunitytogainamorecompleteunderstandingofthethreatstheorganizationmayface.”Usingthisknowledgeallowsanorganizationtomakebetterinformeddecisions,andcreatebetterthreatdetectiontechniquesandriskmitigationstrategies.“Bycorrelatingandanalyzingcyberthreatinformationfrommultiplesources,anorganizationcanalsoenrichexistinginformationandmakeitmoreactionable.”Fourstepscanshifttrueinformationsharingfromconcepttoreality:–Preparingthecompany–Identifyingpartners–Understandingwhattoshare–ProtectingprivacyTheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 10Preparingthecompany–Determininginformationrequirements–Thechallengestemsfromthesheervolumeofinformation.Tosortthroughtheoceanofintelligence,organizationsneedtodeterminetheirinformationrequirementsbasedonthecybersecuritydecisionstheircompanyneedstomake.–Selectingtherighttypeofinformation–Onceabusinessunderstandsitscybersecurityusecases,itthenmustselecttheinformationthatsupportsthoseusecases.Identifyingpartners–Allorganizationswishtoreceiveintelligencebutfortheretobeanyrelevantinformationtoreceive,someonehastoshareitinthefirstplace.Aswiththeinformationconsumed,theinformationanorganizationsharesbackandhowitdoessodependonitssituation.–Sharingbackdoesnotmeananorganizationmustshareeverything,butitdoesrequiresharingtobebidirectional.–Sharingnetworksneedtosupportmultipletypesofsharingpartnerships.FIGURE Asamplesharingecosystem

–Manytypesofinformationexist,rangingfromtechnicalindicatorstothreatactorprofilestodefensivemeasuresandbestpractices.–Integratingsecurityactionsinbusinessactivities–Thisstepinvolvesintegratingtheinformationinthefirm’ssecurityandbusinessdecisions.–Ensuringsustainability–Weavinginformationsharingintotheday-to-dayactivitiesofcybersecuritystaffandprovidingregularfundingarecriticalforsuccess.–Thefastestwaytoachievesharingistobuildontopofanexistingnetworkwheneverpossible.–Sharingisatitsmostimpactfulwhenitisbuiltoncirclesoftrust.WithintheISACs,circlesoftrustareoftenformedbetweentheleadersofthesecurityoperationsandintelligenceteamsfromthevariousparticipatingcompanies.–Onekeyrecommendationistothinkaboutcirclesoftrustoccurringatvariouslayersofanorganization,goingbothdeeperwithintheorganizationbutalso,andmorecritically,higherwithinitsothatCISOsandCIOsarealsotalkingtoeachother.CompanyA’sclientsSectorISACOtherISACsCompanyBCompanyALawenforcement&governmentCompanyA’svendors&partnersISAC=InformationSharingandAnalysisCentreSource:GlobalResilienceFederation TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 11Understandingwhattoshare–Thegoalsofsharingmustnotbearbitrary.Theyshouldbedeterminedbywell-definedusecasesthatfallintooneofthefollowingcategories:–Protectingthefirm’sabilitytooperatesafely–Protectingthefirm’sclients–Protectingthesafetyandsoundnessofthe“system”–Protectingthenation’scriticalinfrastructure

–Often,theperfectistheenemyofthegood,asorganizationsassumethatbecausesomeinformationistoosensitivetoshare,theycannotshareanythinguseful.–Someinformationisalmostalwaysbetterthannoinformation.–Knowingwhatmayproveusefultoanothercompanyisusuallyimpossible,soerringonthesideofsharingmakessense.Protectingprivacy–Akeyconsiderationwhensharingishowtosharewhilecomplyingwiththevariousinternationalprivacyregimes.–Anewbroadrangeoftechnologiescalled“privacy-enhancingtechnologies”(PETs)hasemergedtoaddressthischallenge.–PETsenableorganizationstosharedatawhilepreservingprivacy,securityandregulatorycompliance.

–AvarietyofPETsareavailabletoday,includinghomomorphicencryption,securemultipartycomputationanddifferentialprivacy,eachofwhichofferssolutionstodifferentcollaborationchallenges.–Inparticular,homomorphicencryptionhasbecomepopularinorganizationsthatendeavourtocollaboratewiththeirecosystemonsensitivedatawhileprotectingtheirbusinessinterestsandcomplyingwithdataprivacyregulations.TheBusinessImperativeofCyberInformationSharingforOurCollectiveDefence 12ConclusionTheescalatingcyberthreatenvironmentpresentsariskofoperationaldisruptiontoeveryenterprisetoday.Attheextreme,attackscanposeanexistentialthreattoacompanyor,worse,canleadtothelossoflife.Tohaveanychanceofsuccessfullydefendingthemselves,enterprisesmustacceptandadoptacorephilosophyofcollectivedefence;truecyberinformationsharingisatthecentreofacollectivedefencestrategy.Informationsharingisvitallyimportantforaneffectiveapproachtocybersecurity.IntheUnitedStates,forexample,theCybersecurity&InfrastructureSecurityAgencyand,intheEU,ENISAbothhaveidentifiedinformationsharingasessentialtoimprovingtheworld’scybersecurityriskposture.

Aswithanybusinesspriority,successreliesontheactivesupportandengagementoftheC-suite,andtraditionalreluctancestemmingfromcompetitive,regulatorycomplianceandprivacyperspectivesmustbeputaside.Achievingtruecyberinformationsharingisabusinessprerogativethatrequiresanappetiteforcollaborationandswiftactionbyallorganizations.Cyberistheultimateteamsport,andweneedtocreateanenvironmentwherethechallengesexperiencedbyonecompanyleadtothebenefitofmanycompanies.Intelligencesharingisacriticalcomponentinourabilitytoachievethatgoal.”Admiral

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論