Sponsored By

Information Sharing: Smart Move?Information Sharing: Smart Move?

A threat intelligence specialist explains the pros and cons.

Gary Audin

November 27, 2020

4 Min Read
Information Sharing: Smart Move?
Image: ribkhan - stock.adobe.com

If you share cybersecurity information, vulnerabilities, exposures, and solutions, are you creating more threats to your business? And if you don’t share it, will you miss something that you will regret in the future? The expansion of work from home users has accelerated the potential cybersecurity vulnerability issues. Who do you trust to share cybersecurity information with responsibly?

 

A few years ago, I wrote, “Go It Alone or Share Attack Data,” where I explored security information sharing. I wanted an update on the topic, so I turned to Neal Dennis, Threat Intelligence Specialist at Cyware, a provider of threat intelligence and cyber fusion solutions. Here’s an edited version of our conversation.

 

GA: What is an Information Sharing and Analysis Center (ISAC), and what are Information Sharing and Analysis Organizations (ISAO)?

ND: ISAC’s generally focus on critical industries and typically have more formalized information sharing and support ties with government organizations like the Department of Homeland Security. An ISAO is a more privatized sharing organization, not necessarily connected officially to government support initiatives, but can tie into sharing back to the government and isn’t necessarily industry-specific.

 

ISAC’s are also an older concept that focuses on specific industry verticals. ISAO’s are newer and provide an avenue for any vertical to officially create a mechanism to support information sharing. At the end of the day, the overall goals of both groups are usually the same, and many have started to create pathways to share and work together.

 

GA: Why do we need to share this information?

ND: Being involved in one or more of these organizations provide multiple benefits. First, you get the upfront advantage of not being alone in the cybersecurity battle. You can and should leverage your new peers to discuss security issues impacting your environment and to share and consume observables for inclusion in your own security stack to help develop a more proactive security posture.

 

Members can also leverage one another to develop best practices for their industry or sharing community. They can gain additional support during an incident or bounce ideas, and concerns off of a larger community that could help them research incidents more thoroughly. You would have access to a group that provides feedback on a whole host of issues, from risk and compliance to best practices for patch management.

 

Additionally, sharing communities aren’t just for incident responders or, conversely, senior leadership. A solid community can open communication pathways for an entire security organization across cyber and physical domains.

 

GA: Are attackers sharing information?

ND: Most definitely. We've seen threat actors specialize in key capabilities, like the delivery of malware to compromised systems or the creation and maintenance of a particular ransomware infrastructure. They look for assistance in exploiting new systems or selling off compromised information.

 

Many threat actors operate with similar business strategies we often see in any normal product-driven company. They barter, procure services, sell offerings, and, more importantly, look for ways to fill in gaps in their own capabilities. They do all this information sharing and swapping in very efficient manners.

 

GA: What is the value of information sharing? Is there a downside?

ND: If we want to ever move beyond a heavy response-driven security methodology across the board and into a more proactive posture, we need to share more information. We need to continue to drive towards more automation to support it. The true value of information sharing begins when you realize your own organization has a much larger sensor grid to rely on for awareness. By sharing information with your peers, you're working to more proactively support your community and make it more difficult for threat actors to target.

 

Sharing and consuming threat intelligence can help organizations determine trends impacting their industry verticals and as a team develop requirements for new tools and resources based on those trends. Sharing can also help make the community less desirable to threat actors by mitigating malicious campaigns across their sharing communities and their own networks sooner.

 

GA: Will sharing help with privacy concerns such as in a contact center?

ND: In the U.S., there are federal policies in place to help mitigate privacy concerns and what would constitute a breach. If the information shared ai deemed needed to help other organizations research or manage their investigations, there should be no privacy concerns.

 

The Cybersecurity Information Sharing Act of 2015 defines what can be shared by private entities with the Government. It’s a good guideline for what could be shared with members of a sharing community.

 

GA: Where does the National Council of Information Sharing and Analysis Center (NCI) fit into the picture?

ND: The NCI is a great resource for anyone in a specific industry vertical looking to get involved and develop cross-sharing partnerships with other ISACs. They also provide insights and standards for new ISACs. The ISAO community is a great supporter of ISAO startups and standards.

 

For those needing more consultative guidance, the Global Resilience Federation (GRF) specializes in building ISACs/ISAOs and CERTs. On top of helping create new sharing communities, members of the GRF are already able to share information across multiple sharing organizations.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.