SlideShare a Scribd company logo
1 of 3
Download to read offline
Michael Echols
Why Share Cyber Threat Information
mikeechols.com/why-share-cyber-threat-information
Cyber threat information sharing is essential to thwarting successful hacks and minimizing
consequences should a breach occur. For many years large organizations have had
opportunities to work with the Department of Homeland Security (DHS) to share indicators of
compromise to ensure the protection of critical infrastructure and major business entities. There
is an opportunity now for every company to participate and it was institutionalized through
Executive Order 13691 in 2015. Now, any business or organization can create an Information
Sharing and Analysis Organization (ISAO) and access sharing programs established by DHS and
managed by the International Association of Certified ISAO (IACI).
As the lead federal department for the protection of critical infrastructure and the furthering of
cybersecurity, DHS has developed and implemented numerous information sharing programs.
IACI partners with DHS to build and provide guidance for emerging and existing ISAOs. The
National Cybersecurity and Communications Integration Center (NCCIC), within the CISA Office,
serves as a centralized location where operational elements are coordinated and integrated.
NCCIC partners include all federal departments and agencies; state, local, tribal, and territorial
governments; the private sector; and international entities. The NCCIC’s activities include
providing greater understanding of cybersecurity and communications situation awareness
vulnerabilities, intrusions, incidents, mitigation, and recovery actions.
1/3
Working With The DHS NCCIC
Neither a formal information-sharing agreement nor a security clearance is a prerequisite to
share information with or receive information from the NCCIC, and entities take advantage of
NCCIC’s resources at a variety of levels. However, ISAO are afforded limited liability protection
for the information they share. The ISAO can’t be regulated based on the information and have
some court protections. ISAOs have the opportunity to sign a Cyber Information Sharing and
Collaboration Agreement (CISCA) with DHS that affords them even more access.
There are four levels of agreements in which partners engage and are integrated with the
NCCIC:
Level 1 – Entities have the ability to share information with the NCCIC, as well as to
collaborate in both ongoing and incident response situations. This can include a physical,
day-to-day, presence of designated representatives in the NCCIC watch floor. These
participants are actively involved in daily NCCIC operations and are closely coordinated
with the NCCIC’s personnel. The agreement for this is the Cooperative Research and
Development Agreement.
Level 2 – Entities engage in bilateral information sharing in the form of indicator exchange
activities only, to include automated indicator sharing. The agreement required for this
type of engagement and information sharing is shorter and more lightweight than a
formal CISCA. It can be a memorandum of understanding or agreed upon terms of
use. One example of such an agreement in use today is the terms of use to access the U.S.
Computer Emergency Readiness Team (US-CERT) portal, a secure, web-based,
collaborative system to share sensitive, cyber-related information and news with
participants in the public and private sector, including the Government Forum of Incident
Response and Security Teams, the Chief Information Security Officer Forum, National
Cyber Response Coordination Group, Information Sharing and Analysis Centers members,
and various other working groups. Stakeholders agree to terms of use to become
authorized users of the portal.
Level 3—Private entities can access our products online, including NCCIC and US-CERT
bulletins, educational and training resources, and best practices. Coordination is virtual
and communication is electronic, through the NCCIC’s information sharing mechanisms, to
include reports, advisories, and bulletins with threat and mitigation information. No
agreement is necessary for this type of sharing, and many entities of various sizes make
use of the NCCIC’s resources.
Level 4- Private entities can engage with each other using a DHS forum to share best
practices, share mitigation techniques and manage risk in a trusted environment.
Start an ISAO
2/3
Taking advantage of information sharing program does not require a direct relationship with
DHS. The ISAO offers a barrier between the company and the government. Smart companies
join ISAOs to know if something is happening in networks of their partners. Truth is if it is
happening to them – you are probably next. Go to www.certifiedisao.org for more information.
3/3

More Related Content

What's hot

SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSS. F. (Sid) Nash
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
RSA Security Data Access Governance Infographic
RSA Security Data Access Governance InfographicRSA Security Data Access Governance Infographic
RSA Security Data Access Governance InfographicEMC
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaMolly Immendorf
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementDavid Sweigert
 
Kentucky's Cyber Enclave
Kentucky's Cyber EnclaveKentucky's Cyber Enclave
Kentucky's Cyber EnclaveDawn Yankeelov
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systemsAnahi Iacucci
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Securitymferraz
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 
Edward Banayoti Sawiris
Edward Banayoti Sawiris Edward Banayoti Sawiris
Edward Banayoti Sawiris MichaElsimo2
 
EDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findingsEDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findingsKathleen Wooley
 
GAC, the PSWG and LEAs, particularly in Africa
GAC, the PSWG and LEAs, particularly in Africa GAC, the PSWG and LEAs, particularly in Africa
GAC, the PSWG and LEAs, particularly in Africa APNIC
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 

What's hot (20)

SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
 
Infographic Protecting Patient Data
Infographic Protecting Patient DataInfographic Protecting Patient Data
Infographic Protecting Patient Data
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
RSA Security Data Access Governance Infographic
RSA Security Data Access Governance InfographicRSA Security Data Access Governance Infographic
RSA Security Data Access Governance Infographic
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social Media
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency Management
 
Why Data Security is Important
Why Data Security is ImportantWhy Data Security is Important
Why Data Security is Important
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Kentucky's Cyber Enclave
Kentucky's Cyber EnclaveKentucky's Cyber Enclave
Kentucky's Cyber Enclave
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systems
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
Edward Banayoti Sawiris
Edward Banayoti Sawiris Edward Banayoti Sawiris
Edward Banayoti Sawiris
 
EDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findingsEDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findings
 
GAC, the PSWG and LEAs, particularly in Africa
GAC, the PSWG and LEAs, particularly in Africa GAC, the PSWG and LEAs, particularly in Africa
GAC, the PSWG and LEAs, particularly in Africa
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 

Similar to Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information

PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)Jamie Clark
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Ac breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webAc breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webatlanticcouncil
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxmattjtoni51554
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Bja cyber fusioncenters
Bja cyber fusioncentersBja cyber fusioncenters
Bja cyber fusioncentersAnonDownload
 
Bureau of justice assistance guide cyber integration for fusion centers
Bureau of justice assistance guide  cyber integration for fusion centersBureau of justice assistance guide  cyber integration for fusion centers
Bureau of justice assistance guide cyber integration for fusion centersAnonDownload
 
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceCyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceDavid Sweigert
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Collaborative Knowledge Networks Market Assessment
Collaborative Knowledge Networks  Market AssessmentCollaborative Knowledge Networks  Market Assessment
Collaborative Knowledge Networks Market AssessmentDon_Johnson
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 

Similar to Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information (20)

PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Ac breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webAc breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_web
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docx
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Bja cyber fusioncenters
Bja cyber fusioncentersBja cyber fusioncenters
Bja cyber fusioncenters
 
Bureau of justice assistance guide cyber integration for fusion centers
Bureau of justice assistance guide  cyber integration for fusion centersBureau of justice assistance guide  cyber integration for fusion centers
Bureau of justice assistance guide cyber integration for fusion centers
 
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceCyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Collaborative Knowledge Networks Market Assessment
Collaborative Knowledge Networks  Market AssessmentCollaborative Knowledge Networks  Market Assessment
Collaborative Knowledge Networks Market Assessment
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 

Recently uploaded (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 

Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information

  • 1. Michael Echols Why Share Cyber Threat Information mikeechols.com/why-share-cyber-threat-information Cyber threat information sharing is essential to thwarting successful hacks and minimizing consequences should a breach occur. For many years large organizations have had opportunities to work with the Department of Homeland Security (DHS) to share indicators of compromise to ensure the protection of critical infrastructure and major business entities. There is an opportunity now for every company to participate and it was institutionalized through Executive Order 13691 in 2015. Now, any business or organization can create an Information Sharing and Analysis Organization (ISAO) and access sharing programs established by DHS and managed by the International Association of Certified ISAO (IACI). As the lead federal department for the protection of critical infrastructure and the furthering of cybersecurity, DHS has developed and implemented numerous information sharing programs. IACI partners with DHS to build and provide guidance for emerging and existing ISAOs. The National Cybersecurity and Communications Integration Center (NCCIC), within the CISA Office, serves as a centralized location where operational elements are coordinated and integrated. NCCIC partners include all federal departments and agencies; state, local, tribal, and territorial governments; the private sector; and international entities. The NCCIC’s activities include providing greater understanding of cybersecurity and communications situation awareness vulnerabilities, intrusions, incidents, mitigation, and recovery actions. 1/3
  • 2. Working With The DHS NCCIC Neither a formal information-sharing agreement nor a security clearance is a prerequisite to share information with or receive information from the NCCIC, and entities take advantage of NCCIC’s resources at a variety of levels. However, ISAO are afforded limited liability protection for the information they share. The ISAO can’t be regulated based on the information and have some court protections. ISAOs have the opportunity to sign a Cyber Information Sharing and Collaboration Agreement (CISCA) with DHS that affords them even more access. There are four levels of agreements in which partners engage and are integrated with the NCCIC: Level 1 – Entities have the ability to share information with the NCCIC, as well as to collaborate in both ongoing and incident response situations. This can include a physical, day-to-day, presence of designated representatives in the NCCIC watch floor. These participants are actively involved in daily NCCIC operations and are closely coordinated with the NCCIC’s personnel. The agreement for this is the Cooperative Research and Development Agreement. Level 2 – Entities engage in bilateral information sharing in the form of indicator exchange activities only, to include automated indicator sharing. The agreement required for this type of engagement and information sharing is shorter and more lightweight than a formal CISCA. It can be a memorandum of understanding or agreed upon terms of use. One example of such an agreement in use today is the terms of use to access the U.S. Computer Emergency Readiness Team (US-CERT) portal, a secure, web-based, collaborative system to share sensitive, cyber-related information and news with participants in the public and private sector, including the Government Forum of Incident Response and Security Teams, the Chief Information Security Officer Forum, National Cyber Response Coordination Group, Information Sharing and Analysis Centers members, and various other working groups. Stakeholders agree to terms of use to become authorized users of the portal. Level 3—Private entities can access our products online, including NCCIC and US-CERT bulletins, educational and training resources, and best practices. Coordination is virtual and communication is electronic, through the NCCIC’s information sharing mechanisms, to include reports, advisories, and bulletins with threat and mitigation information. No agreement is necessary for this type of sharing, and many entities of various sizes make use of the NCCIC’s resources. Level 4- Private entities can engage with each other using a DHS forum to share best practices, share mitigation techniques and manage risk in a trusted environment. Start an ISAO 2/3
  • 3. Taking advantage of information sharing program does not require a direct relationship with DHS. The ISAO offers a barrier between the company and the government. Smart companies join ISAOs to know if something is happening in networks of their partners. Truth is if it is happening to them – you are probably next. Go to www.certifiedisao.org for more information. 3/3