This presentation reviews the findings of the legal component of the International Cyber Threat Sharing (ICTS) Project. Unlike cyber threat information sharing initiatives being developed at country and regional levels, which focus on sharing threat intelligence between private sector and government entities, the focus of ICTS is business-to-business sharing. Automated exchange of cyber threat intelligence is integral, as it accelerates the speed of intelligence sharing. But organizations need to know if this type of sharing is legal. Many factors can affect an organization’s legal ability to engage in global business-to-business sharing of cyber threat information. Of concern is whether IP addresses can be lawfully shared between organizations as cyber threat intelligence.
This presentation provides a look at the research undertaken to address this issue and the findings to date, including how the international sharing of cyber threat intelligence occurs within the private sector. The research is relevant to executives and directors of threat intelligence, incident response, risk and audit operations of global organizations, and U.S. organizations who process data on foreign citizens. The findings assist in understanding the international legal environment surrounding considerations necessary to develop organization policy and procedures to enable timely, and effective legal sharing of cyber threats.
Auditorium Borderless Cyber USA / New York / 21-22 June 2017 events@oasis-open.orgThis presentation reviews the findings of the legal component of the International Cyber Threat Sharing (ICTS) Project. Unlike cyber threat information sharing initiatives being developed at country and regional levels, which focus on sharing threat intelligence between private sector and government entities, the focus of ICTS is business-to-business sharing. Automated exchange of cyber threat intelligence is integral, as it accelerates the speed of intelligence sharing. But organizations need to know if this type of sharing is legal. Many factors can affect an organization’s legal ability to engage in global business-to-business sharing of cyber threat information. Of concern is whether IP addresses can be lawfully shared between organizations as cyber threat intelligence.
This presentation provides a look at the research undertaken to address this issue and the findings to date, including how the international sharing of cyber threat intelligence occurs within the private sector. The research is relevant to executives and directors of threat intelligence, incident response, risk and audit operations of global organizations, and U.S. organizations who process data on foreign citizens. The findings assist in understanding the international legal environment surrounding considerations necessary to develop organization policy and procedures to enable timely, and effective legal sharing of cyber threats.