




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、抵御网络安全威胁建立企业竞争优势HOW THREAT SHARING HONES YOURCOMPETITIVE EDGEIts for the greater goodThe bad guys do it all the time, so the good guys should tooIts the right thing to doArguments for threat intelligence sharing rely on altruistic reasons.2TY P I C A LA R G U M E N T SF O RW H YC Y B E RC O M P A N
2、I E S SH O UL DSH A R ET H R E A TI N T EL L I G EN C E THREAT SHARING IS EASY TO TALK ABOUT, BUT HARD TO DO IN PRACTICE3Even harder to do consistently at high quality and large scaleReally, really hard in the face of competitive pressuresWH A TO F T E NH A P P E NSA SAR E S U L T :CTAs sharing acti
3、vities around WannaCry made the entire industry better off, but also directly helped our membersITM A K E SY O UW A N N A CR Y .4IMPEDIMENTS: WHAT MAKES SHARING HARD AND HOW TO OVERCOME THESE BARRIERSTechnicalData volume, speed, and diversity pose problemsFive factors inhibit threat sharing:Legal Pa
4、rameters for acceptablesharing can be unclearCultural Sharing undercuts mybusiness modelEconomicHard to measure the ROI for sharingConceptualThreat sharing means different things to different peopleWH A TM A K E ST H R E A TS H A R I NGS OH A R D ?6Technical Technical standards exist Big data analyt
5、ics commonWays to move past the inhibitions:LegalUS & EU have legal frameworks Sharing organizations existCulturalIts not what you know, but what you do with what you knowEconomicCase studies show the benefits of sharingConceptualDifferent organizations share different informationWA Y ST OO V E R C
6、O M ET H E S EB A R R I E R S7We have the tools to overcome the impediments but sharing remains ad hoc. Many do not engage it.Organizations must want to share for it to occur.If companies will not share based on altruism, what reason will motivate threat sharing?SOW H A T ?8BEYOND ALTRUISM: THREAT S
7、HARING MAKES A SECURITYPROVIDER MORE COMPETITIVEEvery organization can learn something from sharing.Sharing forces you to defend your conclusions.It builds the connections needed to deal with crises.Regular sharing generates connections and ideasNo single company sees all malicious activityExchangin
8、g business cards in a crisis is a bad ideaHO WD O EST HR E A TS HA R I N GEN HA N C EY O U R CO M P E T I T I V EE D G E ?10Increased security comes from taking actionCybersecurity is not just a technical problemEnd-users are demanding a team approachNo organization has expertise in all the facets o
9、f cybersecurity.Its not what you know, but what you do with what you know.Comparative advantage should drive what organizations do.HO WD O EST HR E A TS HA R I N GEN HA N C EY O U R CO M P E T I T I V EE D G E ?11PRACTICING THE ART AND SCIENCE OF SHARING: HOW TO GET BETTER AT ITEffective threat shar
10、ing requires answering three questions:Who is sharing?What information are they sharing?What purpose are they sharing it for?The answers to these questions enable you to derive and identify the value you receive from sharing by:Focusing on relevant informationAligning sharing goals with business nee
11、dsTracking useful metrics to improve performance over time13HO N I N GY O U RT HR E A TS HA R I N GS K I L L SEight types of relevant information:Technical dataContextAttributionSituational AwarenessStrategic warningTactical warningBest practicesDefensive measures and mitigations14Five types of orga
12、nizations:Cybersecurity providers, platform providers, ISPsInformation sharing organizationsLarge companies and organizationsNational government agenciesLocal government agencies, small and medium businesses, and individualsFO C U S I N GY O U RS H A R I N GE FFO R T SMAKING SHARING WORK IN PRACTICE
13、: LESSONS LEARNED FROM PREVIOUS SHARINGSituational threat sharing reduces the “fog of war”Security community can get to the right answer much more quickly16Campaign threat sharing amplifies actionsCoordinated protections boost impactAutomated sharing enhances outputsOnly way to achieve scope and sca
14、leTH RE A TS H A RI N GE X A M P L E SWorking Groups focus threat sharing on particular events or threatsMembers use shared information to better disrupt malicious activity17Defensive measure threat sharing speeds up mitigation deploymentCustomers are protected more quicklyEarly sharing fills in gap
15、s and enhances defensesRecipients can put protections in place ahead of public releaseTH RE A TS H A RI N GE X A M P L E SF R O MC T ASomething is better than nothingDo not have to share everything for sharing to be usefulAutomation is important for technical sharingNeed speed and scaleHumans are im
16、portant tooPeople have to do something with the informationSharing is hard workTechnical parts can be challenging, but non-technical parts are more difficult18LE S S O N SF R O MO U RS H A R I N GE X P E R I E N C EAPPLYING THESE LESSONS IN THE REAL WORLD: CONCRETE STEPS TO IMPROVE SHARINGIf your or
17、ganization produces, collects, or provides threat intelligence:Analyze what you can share and what you could benefit from receivingJoin a formal threat sharing organizationAutomate the technical intelligence sharingIf your organization consumes threat intelligence:Ask your vendors how they share thr
18、eat intelligence across the industryAsk your vendors to validate the intelligence they share with youMake threat sharing an evaluation criterion in your cybersecurity contracts20AP P L Y I N GT H E S EL E S S O N SA TT H E OR GA N I Z A T I ON A LL E V E LIf your organization shares threat intellige
19、nce amongst members:Update your business rules to encourage sharingFocus on information types that fit your comparative advantageBuild relationships with other threat sharing organizations across sectors and geographic regionsIf your organization is a national government agency:Articulate priorities
20、 clearlyFocus sharing with the private sector on your comparative advantageEncourage cross-sector and international sharing21AP P L Y I N GT H E S EL E S S O N SA TT H E OR GA N I Z A T I ON A LL E V E LTranslate sharing into actionIdentify specific actions for different parts of the ecosystem to takeIdentify real/perceived barriers to actionCollaborate to s
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 维持性血液透析患者甲状旁腺素与心血管事件的相关性研究
- 基于使用后评价的社区养老设施公共空间优化策略研究-以西安市雁塔区为例
- 2025-2030中国橡胶、塑料和化学品领域的机器人技术行业市场发展趋势与前景展望战略研究报告
- 2025-2030中国椰子衍生脂肪酸行业市场现状供需分析及投资评估规划分析研究报告
- 建筑工程结构设计测试卷
- 2025年大学统计学期末考试题库:统计软件自编码器应用试题试卷
- 2025年宠物美容师职业技能考核试卷:宠物护理与美容工具使用技巧试题
- 2025年无人机驾驶员职业技能考核试卷(无人机飞行器动力系统与能源)
- 企业年度客户答谢活动方案
- 金融服务及咨询服务协议
- 2024年河南轻工职业学院高职单招语文历年参考题库含答案解析
- 即时通讯系统建设方案
- 动车乘务实务知到智慧树章节测试课后答案2024年秋陕西交通职业技术学院
- 胎盘植入课件讲义版
- 山东铁投集团招聘笔试冲刺题2025
- 2025年江苏盐城东方集团招聘笔试参考题库含答案解析
- 2021版中医疾病医保对应中医疾病医保2
- 政府绩效评估 课件 蔡立辉 第1-5章 导论 -政府绩效评估程序
- 食堂负责人岗位职责
- 车间排产计划培训
- 无菌医疗器械培训课件
评论
0/150
提交评论