Sei sulla pagina 1di 2

Using a web browser, search for other methods employed by industry or government to share

information on possible incidents.

In my opinion, it is extremely important to share critical security related information. Sharing


information can not only help prevent data breaches and information theft but also pushes
companies to innovate and implement stronger security procedures. In the light of several
breaches in the past few years, the government and industry alike have developed methods,
organizations and strategies to share information and help prevent cybercrimes. The following
are the list of methods employed by government or industry to share information

 Information sharing programs such as Homeland Security Information Network


(HSIN), Automated Indicator Sharing (AIS) which shares the exchange of cyber
threat indicators at machine speed, Traffic Light Protocol (TLP), are amongst the
many which are developed by Department of Homeland Security to prevent
cybercrimes by sharing information with appropriate parties.
 DHS also works closely with Sector- nonspecific Information Sharing and Analysis
Centers (ISACs) which helps share information between industry and the
government.
 The culture of knowledge sharing: Knowledge sharing – not just the previous threats
or threats posed to other organizations but also the technical know-how and just
quantitative information. This culture enables effortless information sharing and
therefore is a constant method in action.
 These organizations or strategies are required because often companies do not prefer
to share that they suffered an incident and might not be enthusiastic about incurring
financial and reputational damage therefore, Bruijn, H. D., & Janssen, M. (2017,
March 17) argue that “Messages should thus be grounded in evidence that is collected
in such a way that it can be trusted. Second, facts need good frames.” Therefore, the
need for evidence-based framing strategies is paramount. How to convey the message
is often equally as important as content of the message, therefore methods to develop
solid evidence-based message framing methods is one of the up and coming strategies
in the world of information sharing.
References:

Catota, F. E., Morgan, G., & Sicker, D. C. (2018, April 30). Cybersecurity incident response
capabilities in the Ecuadorian financial sector. Retrieved September 19, 2020, from
https://academic.oup.com/cybersecurity/article/4/1/tyy002/4990518

Bruijn, H. D., & Janssen, M. (2017, March 17). Building Cybersecurity Awareness: The need for
evidence-based framing strategies. Retrieved September 19, 2020, from
https://www.sciencedirect.com/science/article/pii/S0740624X17300540?via=ihub

CISA. (2020, September 8). Information Sharing and Awareness. Retrieved September 19, 2020,
from https://www.cisa.gov/information-sharing-and-awareness

Potrebbero piacerti anche