Panelists: Trey Ford(@treyford) is the Global Security Strategist at Rapid7, Kevin Bankston (@kevinbankston) is the Director of the Open Technology Institute and Co-Director of the Cybersecurity Initiative at New America, and @brianaengl and @hammem (speaker lineup appears to have changed, so twitter handles are what I've got:-) (also, the podium is super giant and blocking my view of the speakers, so I can't tell you who is saying what).
Sharing sounds like fun, but it's not as simple as we remember from our childhood. There are legal implications, contracts, source trust issues, etc.
Intelligence is like a UDP packet you cast out and hope for the best. How do you determine if the information is still relevant?
Facebook is working on this - how to do exchange of data? What can we learn from it?
When people start sharing data, they realize that they need to share with someone who cares. Ie if you're concern is about phishing, don't build a relationship with someone who is focused on bitcoin.
What is stopping companies from sharing information with other companies and the government? It will be relevant to you if new legislation passes.
Some of the barriers are around the wiretap act (Title II) portion of the ECPA which places limits on real-time communications and limits disclosure.Other limits: federal privacy laws protecting HIPPA data and educational records, self-imposed restrictions in Terms of Service, and anti-trust laws (DoJ could accuse them of colluding in an anti competitive way).
Well, and there are nervous lawyers :-)
Most threat information doesn't include content or PII. Non-content can be liberally shared, with exceptions for security and consent via ToS. DoJ has stated they won't go after companies sharing for these reasons. Companies already do a lot of sharing, so do they really need new legal permissions?
but there's the new CISA: Cybersecurity Information Sharing Act, S. 754. It authorizes sharing of broadly defined "cyber thread indicators" and info about defensive measures" with "any other entity or [any agency of] the Federal Government".
DHS must distribute all information to other agencies including NSA, "not subject to any dleay or modification". Gov't can use the information to investigate or prosecute a range of crimes unrelated to cybersecurity.
The house is also working on bills!
Congress has looking at CISA since 2009, and they are starting to feel like they have to do something so they can show they are serious about cybersecurity.
Please call your senator to oppose the bill and support privacy enhancing amendments. If it does pass, it still has to go to conference with congress.
Check out StopCyberSpying.com or call 1-985-222-CISA for more information.
The REAL King Cake - Yesterday was the 40th anniversary of Elvis Presley's death, so I thought I'd feature some appropriate cakes. However, I realize many of our younger read...