Part 5 - Benefits of Information Sharing

Video Activity

This lesson discusses the benefits of information sharing: · "Knowing is half the battle" · Aids in threat identification · Provides threat warning · Builds relationships · Protects the public and other organizations

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

7 hours 56 minutes
Video Description

This lesson discusses the benefits of information sharing: · "Knowing is half the battle" · Aids in threat identification · Provides threat warning · Builds relationships · Protects the public and other organizations

Video Transcription
So we've talked about the requirements of notifying law enforcement, notifying customers and essentially notifying the person designated by DHHS of these
data breaches. So how does that benefit organizations? We know how notifying our customers kind of benefits us because when it's required by Wall, but to it provides some type of good will and notification to the customers that were at least trying to rectify the situation.
But providing that information to law enforcement
in or providing that information to other organizations one will help us cut down on the amount of incidents that we're going to have to respond to
one, because knowing is half about. So if I know about something,
it's gonna be a lot easier for me to make preparations to respond to
Number 18 and threat of defecation.
So if I know of a particular piece of malware, if I know of the particular happened, that's out there and I know how his Teepees work,
I could essentially
set my set my firewalls to know what to look for.
I can make my employees were aware of how to be cognizant of certain social engineering techniques,
additionally, provides threat morning
so that kind of ties back into knowing and understanding threatened landscape
that organization is gonna face.
But on top of that, sharing information is gonna build relationships. So if something happens to me and it's significantly bad and I have ah, buddy, that may work for another organization and I share that information with him, one that's gonna help his information. It's gonna make him better.
But conversely,
if something happens to him and he shares that with me,
then it will also improve my security posture.
And then, if I'm sharing that information with law enforcement over the federal government, they might actually start sharing information back or building. Those relationships were building our network, and we're helping each other essentially keep each other secure. So got your bodies back.
So in summary, this covers our legal aspects of incident response. So simply, we started with defining expectations of privacy and how that impacts organizations
as they go about collecting evidence as it relates to responding to incidents and remediating incidents.
So what we talked about in that section is that the organizations, especially private organizations, may not have to be cognizant, are abide by the Fourth Amendment for, say, because it doesn't really apply to them except in certain situations. Government employees there always
acquired to abide by the Fourth Amendment because they're agents of the government.
However, private entities might become agents of the government when they're acting at the half of behest of law enforcement. So if you've contacted particular law enforcement agency and they're providing you direction
and guidance on how to
investigating, gather evidence in this case,
at some point you may actually become an agent of law enforcement and the Fourth Amendment and the search more requirement may actually apply to you. That being said is a data owner on dhe owning certain systems and information.
Because of that virtue, you you may actually be able to provide consent
yourself. Eso
times can be a very gray area, very slippery slope.
We also talked about bringing your own device toe work inherently. B Y o. The devices are
almost a security nightmare, and there has to be good policies and procedures in place to deal with incidents on women if they might occur. Because thes are privately owned devices,
taking someone's cell phone away from them may not be as easy as taking a company on cell phone and then searching through that cell phone that even the more of a legal nightmare and headaches. So it's important to have
good policies and procedures in place.
And then, lastly, we talked about the data breach notification standard specifically as it relates to federal law and how persons were supposed to be notified what constitutes P II and then
whom organizations are supposed to notify, such as law enforcement
and or the credit bureau agencies
so that provides basic snapshot of the legal aspects of incident response. I have to capstone this with anything that is contained within this section should not be construed to be legal advice on behalf of myself and our cyber Eri,
Uh, this is
a basic overview of some of the legal aspects that pertain to incident response. So any time you're going to have a question about legal processes or requirements, if you take anything away from this, this section of the course is to you. Consult your legal counsel.
But hopefully this provides a good overview of some of the laws that pertain to incident response and at least helps you ask. Good questions are become aware of certain laws and procedures. So again, Thank you. Hope you've enjoyed the course and check out more courses from cyber.
Up Next