Part 5 - Benefits of Information Sharing

Video Activity

This lesson discusses the benefits of information sharing: · "Knowing is half the battle" · Aids in threat identification · Provides threat warning · Builds relationships · Protects the public and other organizations

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
7 hours 56 minutes
Difficulty
Advanced
CEU/CPE
7
Video Description

This lesson discusses the benefits of information sharing: · "Knowing is half the battle" · Aids in threat identification · Provides threat warning · Builds relationships · Protects the public and other organizations

Video Transcription
00:03
>> We've talked about the requirements of notifying
00:03
law enforcement, notifying customers,
00:03
and essentially notifying the person designated by
00:03
DHS of these data breaches.
00:03
How's that benefit organizations?
00:03
We know how notifying
00:03
our customers benefit us because one,
00:03
it's required by law,
00:03
but two, it provides
00:03
some type of goodwill and notification
00:03
to the customers that were at least trying
00:03
to rectify the situation.
00:03
But providing that information to law enforcement
00:03
and/or providing that information
00:03
to other organizations,
00:03
one, will help us cut down on
00:03
the amount of incidents
00:03
that we're going to have to respond to.
00:03
One, because knowing is half the battle.
00:03
If I know about something,
00:03
it's going to be a lot easier for me to
00:03
make preparations to respond to it.
00:03
Number one, it aids in threat identification.
00:03
If I know of a particular piece of malware,
00:03
if I know of a particular hacker that's out there and
00:03
know how his HTTPS work,
00:03
I can essentially set
00:03
my firewalls to know what to look for.
00:03
I can make my employees aware of
00:03
how to be cognizant of
00:03
certain social engineering techniques.
00:03
Additionally, it provides threat warning.
00:03
That ties back into knowing and
00:03
understanding threat in my scale
00:03
that an organization is going to face.
00:03
But on top of that, sharing
00:03
information is going to build relationships.
00:03
If something happens to me and it's significantly bad,
00:03
and I have a buddy
00:03
that may work for another organization,
00:03
and I share that information with him,
00:03
one that's going to help his information
00:03
is going to make him better.
00:03
But conversely, if something happens to
00:03
him and he shares that with me,
00:03
then it will also improve my security posture.
00:03
Then if I'm sharing that information with
00:03
law enforcement or with the federal government,
00:03
they might actually start sharing
00:03
information back or building those relationships,
00:03
we're building our network,
00:03
and we're helping each other essentially,
00:03
keep each other secure,
00:03
so you've got your buddies back.
00:03
In summary, this covers are
00:03
legal aspects of incident response.
00:03
Essentially, we started with
00:03
defining expectations of privacy and
00:03
how that impacts organizations as they go about
00:03
collecting evidence as it relates to
00:03
responding to incidents and remediating incidents.
00:03
What we talked about in that section is that
00:03
the organizations, especially private organizations,
00:03
may not have to be cognizant or abide by
00:03
the Fourth Amendment per se
00:03
because it doesn't really apply to them,
00:03
except in certain situations.
00:03
Government employees, they're always required to
00:03
abide by the Fourth Amendment because they
00:03
are agents of the government.
00:03
However, private entities might become agents of
00:03
the government when they're acting
00:03
at the half of the hest of law enforcement.
00:03
If you've contacted
00:03
particular law enforcement agency
00:03
and they're providing you
00:03
direction and guidance on how
00:03
to investigate and gather evidence in this case,
00:03
at some point, you may actually become
00:03
an agent of law enforcement and the Fourth Amendment,
00:03
and the search warrant requirement
00:03
may actually apply to you.
00:03
That being said, as a data owner
00:03
>> and owning certain systems and information,
00:03
>> because of that virtue,
00:03
you may actually be able to provide consent yourself.
00:03
At times, it can be
00:03
a very gray area, very slippery slope.
00:03
We also talked about bringing your own device to work.
00:03
Inherently, be allowed the devices
00:03
or almost a security nightmare,
00:03
and there has to be good policies and
00:03
procedures in place to
00:03
deal with incidence when and if they might occur,
00:03
because these are privately owned devices.
00:03
Taking someone's cellphone away from them may
00:03
not be as easy as taking a company owned cellphone.
00:03
Then searching through that cellphone might
00:03
even be more of a legal nightmare and headaches,
00:03
so it's important to have
00:03
good policies and procedures in place.
00:03
Then lastly, we talked about
00:03
the data breach notification standard,
00:03
specifically as it relates to federal law
00:03
>> and how persons are supposed to be notified,
00:03
>> what constitutes PII,
00:03
and then whom organizations are supposed to notify such
00:03
as law enforcement and/or the credit bureau agencies.
00:03
That provides a basic snapshot of
00:03
the legal aspects of incident response.
00:03
I have to caption this
00:03
with anything that is contained within
00:03
this section should not be construed to be
00:03
legal advice on behalf of myself and our Cybrary.
00:03
This is a basic overview of
00:03
some legal aspects that pertain to incident response.
00:03
Anytime you're going to have
00:03
a question about legal processes or requirements,
00:03
if you take anything away
00:03
from this section of the course,
00:03
is to consult your legal counsel.
00:03
But hopefully, this provides
00:03
a good overview of some of
00:03
the laws that pertain to incident response,
00:03
and at least helps you ask
00:03
good questions or become
00:03
aware of certain laws and procedures.
00:03
Again, thank you. I hope you've enjoyed the course,
00:03
and check out more courses from Cybrary.
Up Next