The Business Case for Cyber-Threat Information Sharing

How can you best apply your limited resources to protect and defend your networks against the most probable and damaging threats? A critical input into your organization's risk management plan is access to timely and actionable threat intelligence-intel that is gained through active, voluntary...

Full description

Saved in:
Bibliographic Details
Published inRural Telecommunications Vol. 38; no. 4; pp. 36 - 37
Main Author Ward, Jesse
Format Journal Article Trade Publication Article
LanguageEnglish
Published Washington National Telephone Cooperative Association 22.09.2019
National Telephone Cooperative
Subjects
Online AccessGet full text
ISSN0744-2548

Cover

Loading…
More Information
Summary:How can you best apply your limited resources to protect and defend your networks against the most probable and damaging threats? A critical input into your organization's risk management plan is access to timely and actionable threat intelligence-intel that is gained through active, voluntary participation in robust information sharing forums. Once the foundation was in place, pilot participants exchanged cybersecurity information via a variety of online platforms; participated in weekly virtual meetings to shara cyber intelligence, hear from subject matter experts and collaborate w th their peers; and received curated content from NTCA, including a daily cyberthreat report summarizing open-source news items and alerts fron DHS, and a weekly technical report on exploits and vulnerabilities. In an era of interconnected networks with increased focus by policymakers and regulators on cybersecurity, active, voluntary engagement in cyber information sharing forums demonstrates the rural telecom industry's commitment to the security of your customers, business enterprises and the larger global community. ?
ISSN:0744-2548