TACOMA, WA — (Marketwired) — 09/25/13 — , making the Internet safe through shared intelligence, today announced the immediate availability of its , “Sharing the Wealth, and the Burdens, of Threat Intelligence; Why Security Experts Must Unite Against Cyberattacks, and What-s Stopping Them from Collaborating More Effectively.” The white paper was developed based on interviews with executives and leaders from Microsoft, Georgetown University, the city of Seattle, FIRST (the Forum for Incident Response and Security Teams), a top-10 United States-based bank and more.
Although the consensus was that more needs to occur, the interview subjects had varied analysis of the current state of information sharing. Here-s what some had to say in the paper:
“It generally happens person to person. Generally, it-s bilateral — one company to another,” said IID CEO Lars Harvey. Harvey went on to comment that most data sharing is still “stuck in the -90s: it-s all email lists, server lists… spreadsheets, text files or PDFs.”
A high-level, anonymous representative from a major ISAC (Information Sharing and Analysis Center) stated: “The only programs I am aware of are out of DHS (the United States Department of Homeland Security) and I would give the programs a D-minus. The only reason they don-t get an F is because they are trying.”
Michael Hamilton, Chief Information Security Officer for the City of Seattle, noted that, “Information sharing is still overly predicated on four dudes in a room getting together once a month, talking about what happened last month.”
The white paper details the three stages of threat collaboration as they exist today: Proactive measures, incident response and post-attack inquiries. The paper also addresses what Fortune 500 companies, large government organizations and leading industry groups consider the four main obstacles to information sharing: Manual, disparate technologies and standards, trust issues, liability of sharing, and lack of resources and incentive.
John Scarrow, Microsoft-s General Manager of Safety Services is quoted in the white paper as saying; “The bad guys move fast… So the data needs to move extremely fast if you really want it to have a lot of value.”
“There are a lot of stakes involved in balancing between maintaining the privacy of individual users and still being able to share certain information on security incidents so others can protect themselves,” said Maarten Van Horenbeeck, Chairman of FIRST.
To access the entire report, go to .
IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. For more information about IID, go to .
Contact:
Andrew Goss
VOXUS Inc. (for IID)
253.444.5446
You must be logged in to post a comment Login