Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs

05/31/2018
by   Elaine M. Sedenberg, et al.
0

In recent years the cybersecurity policy debate in Washington has been dominated by calls for greater information sharing within the private sector, and between the private sector and the federal government. The passage of the Cybersecurity Information Sharing Act (CISA) (signed into law under the Cybersecurity Act of 2015) underscored federal efforts to collect information from the private sector, and assuaged some concerns regarding private sector liability in sharing activities. However, the law lacked specificity on how continued federal efforts would work with existing information sharing networks, and failed to address other challenges associated with sharing including trust building, privacy and propriety interests, reciprocation, and quality control. This paper aims to bring granularity to implementations of information sharing initiatives by creating a taxonomy of the governance and policy models within each of these organizations. The research shows how this diverse ecosystem of sharing models work together and separately, and the impact governance and policy have on key components critical to sharing infrastructure.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/05/2013

Knowledge Sharing: A Model

We know anything because we learn about it, there is anything we ever sh...
research
06/17/2022

A Roadmap for Greater Public Use of Privacy-Sensitive Government Data: Workshop Report

Government agencies collect and manage a wide range of ever-growing data...
research
12/19/2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Threat information sharing is considered as one of the proactive defensi...
research
05/25/2023

Distributed Trust Through the Lens of Software Architecture

Distributed trust is a nebulous concept that has evolved from different ...
research
11/20/2017

Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services

Fast development of sharing services becomes a crucial part of the proce...
research
11/20/2020

Resolving the cybersecurity Data Sharing Paradox to scale up cybersecurity via a co-production approach towards data sharing

As cybercriminals scale up their operations to increase their profits or...
research
09/03/2021

Why it takes a village to manage and share data

Implementation plans for the National Institutes of Health policy for da...

Please sign up or login with your details

Forgot password? Click here to reset