CONFERENCE Watch Now: Threat Detection & Incident Response (TDIR) Summit - Watch Event On-Demand
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Global Cybersecurity Collaboration: Challenges and Where We are Today

The evolution of cyberattacks towards stealthy, targeted, persistent threats that use a cocktail of techniques is well recognized. This new set of attackers, consisting of criminal organizations, political groups and malicious hackers, are launching complex, sophisticated attacks that can wreak significant havoc not only on enterprise networks but critical government infrastructure worldwide.

The evolution of cyberattacks towards stealthy, targeted, persistent threats that use a cocktail of techniques is well recognized. This new set of attackers, consisting of criminal organizations, political groups and malicious hackers, are launching complex, sophisticated attacks that can wreak significant havoc not only on enterprise networks but critical government infrastructure worldwide.

It would seem that in this new world where cyberattacks take advantage of a global network of resources to implement their attacks, global cybersecurity cooperation and collaboration is what’s needed to provide visibility into attacks and slow these attackers down. If local, state and global governments can share critical information collaboratively among their entities and with the private sector, this can provide actionable intelligence on current and future attacks.

Cybersecurity Information SharingBut there continues to be significant challenges with global cybersecurity collaboration:

Absence of common language, terminologies and process for sharing – Each enterprise and government entity uses very disparate sets of languages, technologies and process that make the collaboration process ineffective today. Most cybersecurity intelligence is handled via traditional data sharing such as emails, PDFs and CD-ROMs– antiquated, manual processes that cannot support the speed at which attacks today penetrate and infect organizations.

Fear and concerns over sharing – Enterprises, organizations and governments struggle over the extent of attack information they can reveal in attacks. Concerns range from whether the information shared is revealing too much about their business to competitors and nation states, violates user privacy, or could be used by regulators against them. This trust issue is compounded when government agencies are brought into the mix, in particular, government agencies such as the FBI that have a long established history of a closed, secretive culture. The challenge is how to develop a trust framework that can specify who the information should be shared with, and how much to share.

Lack of resources and motivation to share – Many organizations also do not believe in the benefits of sharing details of an attack or breach. There are no incentives or fiduciary responsibility for organizations to disclose a breach unless it impacts a particular compliance requirement. There are more negative implications of sharing the details of a breach such as lost customers, lawsuits and privacy implications. In addition, there is the dilemma that once information about a breach is shared, customers that are impacted must be notified promptly. Notification of breaches must be done in an expedient manner that requires significant resources that may not be available in smaller organizations.

Where are we today?

The good news is that the negative perception on information sharing is waning. The majority of security companies that are attacked are being very open about how they have been breached. For example, companies like RSA and Bit 9 provided comprehensive analysis of attacks to their networks here and here. This is a contrast from how Verisign addressed their breach several years ago. Even though they were attacked in 2010, they did not disclose any information until 2011, and only because of a new SEC-mandated filing.

In addition, we have reached a point where many organizations and agencies have begun discussions on cybersecurity cooperation and intelligence sharing. The creation of “Information Sharing and Analysis Center (ISAC)” for national infrastructure has enabled a forum for managing risks to IT infrastructure and a way to share threat intelligence. Governments have implemented executive orders for enhancing cybersecurity, from President Obama’s executive order on cybersecurity to the British government’s focus on cybersecurity. The Department of Homeland Security has even collaborated and signed letters of intent with governments to share threat intelligence. We are also making larger strides in security companies, and the types of threat data that are being shared with the CSIRT (Computer Security Incident and Response Team) community.

Advertisement. Scroll to continue reading.

Until all these mandates, forums and platforms develop into meaningful information sharing programs, what can organizations do? There are several critical best practices – the first is to segment your networks so that any breaches and ultimate data exfiltration is contained. A segmented network in your organization is akin to an attacker coming in the front door of your home, but being denied access to other rooms in the house. The second best practice is to ensure you have visibility into what applications and information are in your network, who has access to them, and what they are doing with that access. Without this visibility, organizations cannot proactively identify risks that are violating compliance and company policies. This visibility also provides the ability to analyze user data quickly to determine if and when to disclose information in the event of a breach. Finally, it is important to implement a robust threat prevention framework that can analyze both known and unknown threats. These set of best practices together with eventual collaborative intelligence sharing are the right steps toward combating cyberattacks.

Written By

Danelle is a seasoned product and solutions marketing leader with expertise in bringing disruptive security, cloud and AI technologies to market. She has more than 20 years of experience building and scaling GTM teams and positioning companies for growth — from early stage startups to IPO. Prior to Infoblox, Danelle held multiple Chief Marketing Officer roles, including Ordr, Blue Hexagon (acquired by Qualys) and SafeBreach where she helped define and build a new market category. She was also VP strategy and marketing at Adallom (acquired by Microsoft) and played a key role in Palo Alto Networks growth through IPO as a leader in solutions marketing. Earlier in her career, she held senior product management roles at Cisco, overseeing security, networking and VoIP products. She was co-founder of a high-speed networking chipset startup, co-author of an IP Communications Book and holds 2 U.S. patents. She has an MSEE from UC Berkeley.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Jeremy Koppen has left Mandiant after 13 years to become the CISO of Equifax.

Engineering and technology solutions provider Amentum has appointed Max Shier as its CISO.

PAM provider Keeper Security has appointed Shane Barney as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.