{"id":222637,"date":"2017-06-23T13:09:37","date_gmt":"2017-06-23T17:09:37","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-advocates-data-sharing-framework-threatpost.php"},"modified":"2017-06-23T13:09:37","modified_gmt":"2017-06-23T17:09:37","slug":"nsa-advocates-data-sharing-framework-threatpost","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-advocates-data-sharing-framework-threatpost.php","title":{"rendered":"NSA Advocates Data Sharing Framework &#8211; Threatpost"},"content":{"rendered":"<p><p>    NEW YORKThe economics of cybersecurity are skewed in favor of    attackers, who invest once and can launch thousands of attacks    with a piece of malware or exploit kit. Thats why Neal Ziring,    technical director for the NSAs Capabilities Directorate,    wants to flip the financial equation on bad guys.  <\/p>\n<p>    We need to conduct defenses in a way that kills an adversarys    ROI, Ziring said. I want to get it down to the point where a    threat actor says, I better choose carefully where I throw    this malware first, because Im not going to get a third or    fourth try. Today they dont have that concern.  <\/p>\n<p>    In order to decimate a cybercriminals ROI on developing tools    and attack playbooks, Ziring is calling on public agencies,    companies and the security community to radically change the    way they respond to cyberattacks.  <\/p>\n<p>    In a keynote address Thursday at the Borderless Cyber    conference, he said the cybersecurity community needs to work    cooperatively to collectively respond to attacks in the same    spirit they share threat intelligence. He argues, doing so will    deprive cyber threat actors of the ability to use tools and    tradecraft multiple times and starve criminals financially.  <\/p>\n<p>    The future of cyber defense is having a shared response or    coordinated response, Ziring said. We need to break out of    todays enterprise mentality of every person for themselves.  <\/p>\n<p>    The type of framework Ziring describes doesnt exist today, but    two standards come close. Those are STIX (Structured    Threat Information Expression) and TAXII (Trusted Automated    eXchange of Indicator Information) which both deal with sharing    data ahead of an attack. Neither address a key component that    Ziring is calling for which is a public-private framework that    creates a type of autoimmune system. If one node on the network    is attacked, all other connected nodes are warned within    seconds to defend against a similar attack.  <\/p>\n<p>    There is no technological reason why this couldnt work. There    are only practical obstacles like the need for interoperable    standards that will enable us to do this in todays    heterogeneous environments. And thats the bit we are solving    right now with STIX and     OpenC2, he said.  <\/p>\n<p>    Still early in development, OpenC2 is a language that would    enable the coordination and execution of command and control of    defense components between domains and within a domain.  <\/p>\n<p>    Universal support for that type of framework will take a major    shift in industry mindsets. As one conference attendee noted,    today breach data is a carefully guarded secret for many    companies. Ninety-five percent of the dozens of breaches the    attendee said he helped mitigate over the past year were kept    private for fear it might hurt share prices and the companies    reputation.  <\/p>\n<p>    Ziring said the industry does not need new regulations to    mandate breach transparency. The upside to information sharing    is the carrot that he hopes will lure companies, sectors and    communities to be part of the sharing framework. He notes there    are already several critical infrastructure sectors that are    required to report breaches to the DHS.  <\/p>\n<p>    It would be better if we didnt have to create more    regulation. Well have to take a wait and see approach for    now, he said.  <\/p>\n<p>    Currently, the type of framework Ziring describes is extremely    rare. Within the financial services sector breach data is    shared between members of a FS-ISAC (Financial Services    Information Sharing and Analysis Center). When one member is    attacked all other members are alerted and can fend off similar    attacks before they happen.  <\/p>\n<p>    Meanwhile, attack surfaces are growing with the rapid expansion    of cloud, IoT and third-party services. Ziring said current    defenses are not as scaleable as they need to be and cant    match the automated nature of cyberattacks.  <\/p>\n<p>    Using FS-ISAC as a model, Ziring envisions a future where    industry-focused communities share visibility into threats.    When an attack occurred, top-level community members would    analyze the threat and send out counter measures to community    members inoculating them within seconds or minutes from similar    attacks. Its unreasonable to ask small business to be ready    fight off a nation state attack themselves, he said.  <\/p>\n<p>    To many in attendance, that top-level community member is the    government. To that end, Ziring told attendees that NSA and DHS    are committed to be a trusted partner in the framework through    the development of standards such as OpenC2.  <\/p>\n<p>    The government has a unique authority in this area. We are    doing a lot today within the DHS and FBI. I believe government    has a responsibility to share. Culturally, its going to be    tough. But we need to do it, he said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/threatpost.com\/nsa-advocates-data-sharing-framework\/126495\/\" title=\"NSA Advocates Data Sharing Framework - Threatpost\">NSA Advocates Data Sharing Framework - Threatpost<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NEW YORKThe economics of cybersecurity are skewed in favor of attackers, who invest once and can launch thousands of attacks with a piece of malware or exploit kit.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-advocates-data-sharing-framework-threatpost.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-222637","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/222637"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=222637"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/222637\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=222637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=222637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=222637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}