Time
3 hours 1 minute
Difficulty
Advanced
CEU/CPE
3

Video Transcription

00:04
Let's talk about the traffic light protocol.
00:07
This is a really efficient way to
00:11
indicate very clearly the level of security required when certain information is being sent back and forth.
00:19
Uh, it's extremely used to do this with email, for instance. You can use a label like we see here on the left.
00:26
In order to
00:28
put that in the subject line. You could even, you know, if you had the right
00:33
tools at your disposal. You could even color code things, of course, to do. You also indicate their security level.
00:41
Let's have a look at this
00:44
on us, sir dot gov.
00:47
As it says here, it's facilitated share information
00:51
and it gives you a
00:53
okay, uh,
00:55
easy to understand way too.
00:58
Define security level of information you're looking at.
01:02
So not for disclosure.
01:03
For Red Red means danger, that one should be pretty obvious. Amber being limited disclosure
01:08
Green means it's
01:11
allowed within the community. Whatever community of this
01:15
and then white would be something like,
01:18
uh, public information.
01:22
So it's a really efficient way to you to do this.
01:26
And even the, uh,
01:29
official color values are given here. If you wanted to make sure that you're
01:34
your your implementation of traffic light protocol is correct.
01:42
Now let's talk a little bit more about the other aspects of operational sharing,
01:47
trying to find a suitable partners
01:51
within the industry, that urine or within your own
01:55
agency, Let's say,
01:57
trying to find partners with other agencies.
02:00
It used to be
02:00
difficult challenges.
02:04
Trying to find a suitable
02:07
security requirement in another organization so that you can have
02:12
for information at a comparable level can be quite a challenge. But just like anything else providing some value to a existing community or trying to create your own community,
02:22
usually well eventually returned symbols up results.
02:27
There is a school of thought that says that you must contribute something to a community,
02:32
maybe even free of charge, as a way to demonstrate
02:37
your suitability for receiving their contributions.
02:40
It's not a bad way to look at it.
02:42
You give a little and get a little in. That could, uh, help build everyone else's awareness because they're all doing the same thing.
02:50
This concept of the Information Sharing and analysis center then
02:53
makes a lot of sense. This provides a forum to help organize the sharing of information
03:00
any more productive and efficient way.
03:02
So D a chest a golf has a little bit about. These
03:07
kinds of organizations were supposed to be non profit,
03:12
existing just for the purposes of advancing cyberthreat, cyber threat intelligence information.
03:19
And they go into a little bit more detail about some executive orders related to,
03:24
uh,
03:25
cyber threat. Intelligence sharing.
03:29
National Cybersecurity Communication Center is involved.
03:35
There's a standards organization so you can get
03:38
a little bit more detail.
03:42
We can open that really quick,
03:45
and so here you can see more detail. If you want to dig deep,
03:47
dig deeper, especially if you had to
03:52
provide this information as a justification for choosing a particular standard and say, This is you know, the organization that produces the guidance,
04:02
and it's also referenced by D. H s. That should be easy to defend as a as a choice for where you got your information and how you would like to move forward with some operational planning goals.
04:18
So the high level goals of the organization being voluntary in transparent
04:25
make sure the intelligence is actionable,
04:28
it's inclusive.
04:32
There's also a National Council of Information sharing nails, the Centers or Ice ax
04:39
and Wikipedia has some information on this
04:42
and all these director of members include quite a few industries. Important industries
04:46
in the United States. Automotive, aviation, electricity, emergency service's national health, nuclear real estate supply chain water.
04:56
These are all areas that affect just about every kind of corporation. And, of course, citizens
05:02
daily lives as well.
05:04
So some great information here
05:08
thio to be had by joining an organization like this
05:12
and at least figuring out, what else do they do? How how did they share this information
05:16
and
05:17
how was useful? How is it utilized within those various communities? So a couple things to think about their the traffic light protocol and the information sharing and analysis centers.

Up Next

Advanced Cyber Threat Intelligence

The Cyber Threat Intelligence (CTI) course is taught by Cybrary SME, Dean Pompilio. It consists of 12 modules and provides a comprehensive introduction to CTI. The subject is an important one, and in addition to discussing tactics and methods, quite a bit of focus is placed on operational matters including the various CTI analyst roles.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions
Instructor