Mostly Ignored Cybersecurity Collaboration is Becoming a Reality

Times have started changing for the better in the U.S. cybersecurity world. After years of minimal effort to get together to discuss cyberattacks and breaches and share some pertinent data, big companies and the federal government have finally started to collaborate on mitigating big cybersecurity issues.

This is a meaningful development in the mostly isolated arena of cybersecurity professionals -- one in which pros have long communicated only with colleagues and outsiders seldom intervened. But the recent start of serious collaboration is likely to strengthen collective resilience and reactions to potential threats -- and might significantly improve cybersecurity in America over time.

It’s a refreshing new concept similar to the concept of a “neighborhood watch.” In American neighborhoods, the idea is to observe and share criminal information, including the tactics and techniques of attackers, to recognize threats and better defend against them. Studies have shown that most areas associated with a neighborhood watch see crime drop.

There is no reason why a similar outcome can’t be achieved in cybersecurity. After all, a company that shares some of its cybersecurity information with outside organizations and teams is exposed to additional resources and expertise.

As an example, let’s say that an organization has recently expanded its transactional lines of business and in response faces a rapid uptick in fraud. Its anti-fraud team doesn’t yet possess the skills or manpower required to effectively combat the fraudulent schemes. By sharing information and collaborating with other organizations with better-established anti-fraud teams, this company can get more visibility into emerging schemes and guidance on how to shut them down.

For decades, companies and to a lesser extent the government have been very slow to share cybersecurity information. They were worried about legal implications, attacker retaliation, reputational damage or endangering intellectual property. But the number of cyberattacks has consistently escalated over the years despite ever-bigger cybersecurity budgets, and companies and the government have come to realize they can’t effectively fight many cyber-attacks solo. It helps, too, that important cybersecurity information can often be shared without actually revealing identities.

Big technology companies, in particular, are taking cybersecurity collaboration seriously, sparked, in part, by a meeting at The White House last summer in which CEOs in information technology and other industries made concrete promises to President Biden to take action. Google, for instance, said it would invest more than $10 billion over five years to strengthen cybersecurity and also pledged to train tens of thousands of Americans in security-related fields. IBM said it would train more than 150,000 people in cybersecurity skills in three years and also announced a new data storage solutions for critical infrastructure companies.

The groundwork for serious cooperation was probably laid in December 2020, when the devastating hack of network management company SolarWinds was divulged. An estimated 18,000 customers downloaded SolarWinds code containing malware, enabling bad actors to compromise many major companies and U.S. government agencies. It became apparent that business and government expose each other to significant cyber-risks because they are interconnected and rely on the same network of software vendors.

In addition, the cyber community finally conceded that U.S. technology infrastructure, including data centers and industrial control equipment, was mostly owned and operated by private companies acting on their own amid constantly evolving attacks. Underscoring the vulnerability of American players, ransomware breaches last year at giants Colonial Pipeline and JBS Foods undermined the availability of gasoline and food, respectively, in large swaths of the country.

The government and technology companies did make a few efforts in the past to stimulate cybersecurity collaboration, but they were unsuccessful, largely because participation was minimal.

Perhaps the most prominent step was The Cybersecurity Information Sharing Act of 2015, the first major piece of Congressional legislation. It urged businesses and government agencies to share information about cybersecurity threats to better identify cyber-attacks and defend against them. But participation was voluntary and most technology companies declined to participate for privacy reasons. The legislation ultimately failed.

That lesson learned, here are three examples of renewed progress on the cybersecurity front:

  • The White House cybersecurity summit last August. Business leaders in total committed billions of dollars to strengthen cybersecurity in multiple ways. In addition to the plans cited by Google and IBM, there was also the biggest move of all by Microsoft – a $20 billion investment in cybersecurity advancements over the next five years. This included an expansion of Microsoft’s security training network and a commitment to help U.S. government agencies upgrade their digital security systems.
  • The announcement in October by White House Cyber Czar Chris Inglis of a new effort to protect both the public and private sectors. One effort underway is laying the groundwork for more cyber regulations in key industry sectors, including energy and transportation. Inglis is also working to move much of the government to a “zero-trust” model – the assumption that all computer network activity is malicious until users prove otherwise.
  • The National Security Agency also announced in October that more than 100 companies have joined a NSA effort to collaborate with industry on big cybersecurity problems. This includes a goal to speed the translation of intelligence about cyber threats into unclassified forms that can be more widely shared with industry. This is a huge about-face for the NSA, which for decades shunned such public efforts.

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3