Expertopinion
onmanaging
databreaches
Whatisgovernment's
roleinfightingcyber
crime?
What'stheroleofthe
privatesectorinfighting
cybercrime?
ScottN.Schober
Intelligentinformationleadstoactionableitemsforlaw
enforcement,andbothpublicandprivatesectorsplaya
keyroleinsharingthatinformation.Ioftenlikencyber
crimedatacluestoalargejigsawpuzzle.Everytimea
smallpieceisadded,thelargerpicturebecomesalittle
clearer.Governmentneedstofillinthemissing
piecesbysharingcyber-crimeinformation
withtwiththepublicsectorwhenrelevant,ortheycannot
expectthepublictoreciprocateandshareinformation
backtothem.Sharingentailsinvestigationinformation,
technicalprevention,protectivemeasuresandbest
practicesforallindividualsatrisk.
CybersecurityexpertandpresidentandCEO,
BerkeleyVaritronicsSystems,Inc.
ShahidShah
CEO,NetspectiveCommunications,andcybersecurity
andriskmanagementconsultant
Thegovernment’sroleistohelpineducating,galvanizing
thebestandbrightestandestablishingtheecosystemto
helpdeploycyber-crimefighters.Thegovernment
cannotandshouldnotbeseenashavingthe
resources,butitmustleadincreating,managing
andhelpingdeploythebodyofknowledgenecessary
ttofightcybercrime.Theprivatesectorneedstobuildthe
ecosystemsofimplementersandcrimefightersthatfollow
theknowledgebuiltbythecommunityandgalvanizedby
thegovernment.
MorganWright
Principalandowner,MorganWrightLLC,
andcyber-terrorismandcyber-crimeanalyst
Thegovernmenthastheabilitytosetpolicy:
policieson...intelligenceandprotectionofprivate
sectorcompaniesinsharingsimilarinformation,standards,
collaboration,acquisitionandsimilaractivities.It’snotjust
aboutbuildinghigherwallsandbetterdefenses.Ultimately,
theprivatesectorwillservetheirinterests,whichisasit
shouldbe.Theprivatesectorshouldneverberequiredto
seservetheabsoluteinterestsofgovernment,butshould
collaboratetoseewheremutualinterestsareand
focusthere.
EricVanderburg
Securityandtechnologyleader
Thegovernment’sroleisinbringingcyber
criminalstojusticeandtoprovidealegalframework
inwhichthosewhohavebeendamagedbecauseofa
lackofsecuritycontrolscanrecoverlosses.Theprivate
sector’sroleistoimplementreasonablesecuritycontrols
andresponsiblesecuritypracticestosafeguard
organizationalandcustomerdata.
Shouldtheprivate
sectorbemandatedto
shareinformationon
breachesimmediately?
Whyorwhynot?
ScottN.Schober
CybersecurityexpertandpresidentandCEO,
BerkeleyVaritronicsSystems,Inc.
Theprivatesectorshouldvoluntarilyshare
informationspecificallyrelatedtovulnerabilities
andcyberthreats.Whenitcomestobreaches,timeisofthe
essence,sotheyshouldalsobemandatedbylawtoshareinforma-
tionimmediatelywherenecessary.Thismandateincludesthetargets
oftheattack,thenatureofthedatabreachedandstepstoshoreup
security.Companiesarereluctanttosharetheirbreachesand
securityshortcomingsforfeartheircustomersmightleaveorfile
lawsuitsagainstthem.Theyalsofearthemarketreactionfrom
shshareholders.Regardless,thesepainfulbutnecessarypost-breach
stepsbuildresiliencetofutureattacks.Mycompanyfacedtargeted
attacksandhacksthatIinitiallywasreluctanttoshare.Iwasunderno
pressuretorevealembarrassingdetails,butIrealizedmymisfortunes
couldeducateandpreventothersfromgoingthroughthesameplight
soIwroteabookaboutit.
ShahidShah
CEO,NetspectiveCommunications,andcybersecurity
andriskmanagementconsultant
Yes,thereisagoodcasetobemadethatinformation
sharingonbreachesshouldbeshared–and
evenmademandatory–becausebreaches
areoften“contagious.”Justlikehumanandanimal
viruses,contagioncannotbehiddenlegallyandmustbe
sharedthroughtheCentersforDiseaseControl(CDC).
IthinkthIthinkthattheprivatesectorshouldberequired,for
certainkindsofbreachesbutnotnecessarilyall,to
shareinformationthroughacyberCDC.
MorganWright
Principalandowner,MorganWrightLLC,
andcyber-terrorismandcyber-crimeanalyst
EricVanderburg
Securityandtechnologyleader
Notificationsalonedolittlemorethanhurtshareholder
value.Cybersecurityproblemscan’tberegulatedinthe
samewayascarbonemissions.Informationshould
besharedonanongoingbasis,notonlywhen
thereisabreach.Inthisway,anomaliescanbe
ddetectedwhileattacksarestillbeingimplementedinstead
ofaftertheyhavebeensuccessfullydeployed.Already,
manycompaniesareutilizingcloud-basedsolutionsthat
aggregatethedatafrommanycustomerstoimprove
securityforall.Thesearethetypesofsolutionswe
needmoreof,fortheyidentifyenemiesratherthan
casualties.
Wantto
hearmore?
Visit
ibm.co/cyberthreatanalysis
©CopyrightIBMCorporation2016.IBM,theIBMlogoandibm.comaretrademarksofInternationalBusiness
MachinesCorp.,registeredinmanyjurisdictionsworldwide.Otherproductandservicenamesmightbe
trademarksofIBMorothercompanies.AcurrentlistofIBMtrademarksisavailableontheWebat“Copyright
andtrademarkinformation”atwww.ibm.com/legal/copytrade.shtml.

Expert opinion on managing data breaches