Cybersecurity First Principles: A Reboot of Strategy and Tactics by Rick Howard
Author:Rick Howard [Howard, Rick]
Language: eng
Format: epub
ISBN: 9781394173099
Published: 2023-05-02T00:00:00+00:00
The First ISAOs Arguably, the FBI founded the first ISAO in 1996, although the community wouldn't have a name for it until two decades later. They called it the InfraGard National Members Alliance, or InfraGard National, and designed it to facilitate information sharing between law enforcement and the private sector.69 InfraGard isn't a CERT, although it does some of the same things a CERT does, and it isn't an ISAC because it doesn't service one of the U.S. government's critical infrastructure sectors. It's a different thing. The FBI was way ahead of its time in establishing InfraGard by realizing that other communities of likeâminded people might want to share intelligence on their communal set of existential threats, in this case cybercrime.
In the early days, and even still today, one of the recurring stumbling blocks in the information sharing space is the fear that the act of sharing any information about cyberattacks would come back to bite the sharing member in the form of lawsuits. Lawyers from victim organizations worry that their name would become public knowledge and subject the brand to customer lawsuits from people who thought the organization didn't adequately protect their personal data. These lawyers weighed the risk of those potential lawsuits against the benefit of sharing the information with the community and found it wanting. It wasn't until much later that sharing organizations realized that the intelligence they needed to share didn't involve anything about the victim but should focus on how the adversary traversed the intrusion kill chain to be successful. In other words, share the hacker's TTPs, not the details about what happened to the victim. By sharing that intelligence with the community, everybody could be better protected.
In 2015, U.S. President Obama signed Executive Order 13691 establishing the ISAO framework that made it legal to share information about cybersecurity incidents without fear of prosecution.70 ISAOs are sectorâagnostic and can be any group of likeâminded organizations, like the Cyber Threat Alliance. The Executive Order also established a funding path for an ISAO standards organization. I actually worked as the coâchair to the Security and Privacy Committee to help get it started. As of this writing, there are just over 90 ISAOs officially registered with the ISAO standards body.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7781)
Grails in Action by Glen Smith Peter Ledbrook(7696)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6563)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6550)
Running Windows Containers on AWS by Marcio Morales(6080)
Kotlin in Action by Dmitry Jemerov(5065)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4914)
Combating Crime on the Dark Web by Nearchos Nearchou(4497)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4334)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4170)
The Age of Surveillance Capitalism by Shoshana Zuboff(3950)
Python for Security and Networking - Third Edition by José Manuel Ortega(3738)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3508)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3407)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Blockchain Basics by Daniel Drescher(3294)
Learn Wireshark by Lisa Bock(3259)
