Security executives say the sharing of threat information is useful – and they’re already doing it. Legislating it, some say, could get in the way Credit: Thinkstock If Congress does pass, and President Obama signs, legislation governing the sharing of cyber threat information among private organizations and with the government, those who will be the most directly affected will likely by those in IT security leadership – CSOs and CISOs.And, based on the debates on bills now pending in Congress, it would seem that their biggest challenges would be increased pressure to protect personally identifiable information (PII), to make sure that trade secrets or other intellectual property doesn’t get inadvertently “shared” along with threat information, and to make sure that the organization doesn’t ignore threat information from others that then leads to a breach.Those bills may not get any serious attention at least until next month, and there is no guarantee that anything will get completed – the Senate bill is stalled at the moment and has at least 22 proposed amendments pending. But Ari Schwartz, director of cybersecurity for the National Security Council at the White House, told attendees at the Senior Executive Cyber Security Conference in Baltimore last Thursday that he was optimistic that conflicts over differing provisions in the bills could be sorted out in conference committee negotiations.Is that possibility making the CISO/CSO community thrilled or nervous about impending drastic changes to their jobs? Apparently neither at least in part because, based on the track record of previous Congressional efforts, it is almost impossible to predict what might end up on the president’s desk.[ ALSO ON CSO: REVIEW: Threat Intelligence could turn the tide against cybercriminals ] As Rick Howard, CSO of Palo Alto Networks put it, “trying to discern what will come out of Congress is a fool’s errand. As a body, they seem to always fumble the ball before they get it across the goal line.”Indeed, Howard said he and other IT executives have, “grown weary of waiting for the government to come up with something. We have decided to do something ourselves.”That “something” is the creation of the Cyber Threat Alliance, a group of security vendors that have agreed to share threat information with one another. So far, it includes Palo Alto, Symantec, Intel, Fortinet, Barracuda, zScaler, Telefonica and Reversing Labs.It was launched about a year ago, and Howard said, “we have a long ways to go, but I am hopeful that this kind of arrangement will work more quickly than anything that comes out of the government.”The Alliance, along with other, longer-established organizations like ISACs (Information Sharing and Analysis Centers) and ISAOs (Information Sharing and Analysis Organizations) that are promoted by DHS, are examples of what several speakers at the conference said is happening voluntarily, without any legislation.[ ALSO ON CSO: Silicon Valley wary of U.S. push for cyber security info sharing ] “Information sharing is moving forward,” said Robyn Greene, policy counsel of the New America Foundation’s Open Technology Institute, adding that the pending bills deserve scrutiny, “but I don’t think they will improve it (sharing).”Kim Jones, CSO at Vantiv, who stressed he was speaking for himself and not his company, said he is not familiar enough with the details of the legislation to comment on it specifically, but did not think it will substantively change his job. “I deal with regulatory and legal compliance every day; this will be just another requirement,” he said. “Figuring out the mechanics of complying will be a long discussion with my legal team, my compliance team, and my regulators.”Jones said he is, in general, a proponent of data sharing. “In security, the problem that you have today, I will most likely have tomorrow,” he said. “Sharing data around threats and issues can help us get ahead of the bad guys.”But he said problems can arise, “when you legislate that sharing.” First, he said, it is easy to get “bogged down” in definitions and interpretations of terms like “threat” or “incident.” Those issues then, “get decided by corporate counsel versus security professionals.”Second, he said, is that ensuring complete anonymity of data becomes “hyper-critical.”“Once the data is amassed, what’s to prevent it from being pivoted and analyzed in a way that was not anticipated by the legislation?” he said. “If it is truly anonymized there’s no issue, but if there’s any traceability back to companies or individuals, the possibilities for misuse or abuse are only limited to the creativity and imagination of our thoughts.”Finally, he said sharing mandates could cause legal trouble for CSOs, and could reduce incentives to share.“What happens when Company A refuses to share a nugget of data with the government but wants to share with his fellow CSOs? Potentially, Company A is breaking the law – and now the CSOs of Companies B and C are complicit in that action.”According to Howard, the sharing rules of the alliance are simple and effective. “You have to give as much as you get,” he said. “To get intelligence, you have to share intelligence, and we measure it every day.”And he said it is useful. “Whatever I get from other alliance members, I dump right into the product. Whatever I give the other members, they do the same.”The goal is to grow the alliance to the point that, “every Internet-capable organization on the planet will have access to the latest and greatest real-time threat intelligence security controls.“It is a pretty big idea and we have some hurdles to get over,” he said, “but I am hopeful.” Related content news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Android Security Mobile Security news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities opinion Cybersecurity professional job-satisfaction realities for National Cybersecurity Awareness Month Half of all cybersecurity pros are considering a job change, and 30% might leave the profession entirely. CISOs and other C-level execs should reflect on this for National Cybersecurity Awareness Month. By Jon Oltsik Oct 03, 2023 4 mins CSO and CISO Careers Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe