Auditorium
Jun 21, 2017 02:15 PM - 02:45 PM(America/Chicago)
20170621T1415 20170621T1445 America/Chicago The Legality of the International Business-to-Business Sharing of IP Addresses as Cyber Threat Intelligence.

This presentation reviews the findings of the legal component of the International Cyber Threat Sharing (ICTS) Project. Unlike cyber threat information sharing initiatives being developed at country and regional levels, which focus on sharing threat intelligence between private sector and government entities, the focus of ICTS is business-to-business sharing. Automated exchange of cyber threat intelligence is integral, as it accelerates the speed of intelligence sharing. But organizations need to know if this type of sharing is legal. Many factors can affect an organization’s legal ability to engage in global business-to-business sharing of cyber threat information. Of concern is whether IP addresses can be lawfully shared between organizations as cyber threat intelligence.

 

This presentation provides a look at the research undertaken to address this issue and the findings to date, including how the international sharing of cyber threat intelligence occurs within the private sector. The research is relevant to executives and directors of threat intelligence, incident response, risk and audit operations of global organizations, and U.S. organizations who process data on foreign citizens. The findings assist in understanding the international legal environment surrounding considerations necessary to develop organization policy and procedures to enable timely, and effective legal sharing of cyber threats.

Auditorium Borderless Cyber USA / New York / 21-22 June 2017 events@oasis-open.org
7 attendees saved this session

This presentation reviews the findings of the legal component of the International Cyber Threat Sharing (ICTS) Project. Unlike cyber threat information sharing initiatives being developed at country and regional levels, which focus on sharing threat intelligence between private sector and government entities, the focus of ICTS is business-to-business sharing. Automated exchange of cyber threat intelligence is integral, as it accelerates the speed of intelligence sharing. But organizations need to know if this type of sharing is legal. Many factors can affect an organization’s legal ability to engage in global business-to-business sharing of cyber threat information. Of concern is whether IP addresses can be lawfully shared between organizations as cyber threat intelligence.

 

This presentation provides a look at the research undertaken to address this issue and the findings to date, including how the international sharing of cyber threat intelligence occurs within the private sector. The research is relevant to executives and directors of threat intelligence, incident response, risk and audit operations of global organizations, and U.S. organizations who process data on foreign citizens. The findings assist in understanding the international legal environment surrounding considerations necessary to develop organization policy and procedures to enable timely, and effective legal sharing of cyber threats.

Professor at the Law Center, and a Fellow at the Center on National Security and the Law
,
Georgetown University
Moderators public profile is disabled.
Attendees public profile is disabled.
Upcoming Sessions
511 visits