Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Public-private partnerships: A catalyst for industry growth and maturity
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Successful partnerships offer a blueprint for effective collaboration

Numerous cybersecurity-focused partnerships are underway, involving successful collaboration across all sectors. These examples can help take public-private partnership efforts from abstract ideas to impactful execution and provide valuable insights and lessons learned.One example is the work being done by the Cyber Threat Alliance (CTA) and its members. Earlier this month, the CTA introduced its Responsible Vulnerability Communication Policy, laying out guidelines for responsibly handling disclosed vulnerabilities in any product or system in a way that optimizes secure outcomes. The CTA and its members created this policy in response to decades of discussion across the industry about how to responsibly discuss vulnerabilities. Practitioners have long debated how to disclose newly identified vulnerabilities in software offerings and how companies should proceed after learning about vulnerabilities in their own products through third parties.The development of and enthusiastic response to this policy is a sign of a maturing cybersecurity industry. The new policy is a strong example of greater standardization of ethical practices across the industry, better alignment with globally recognized standards, and increased transparency and collaboration among software vendors, government agencies, and researchers. The Responsible Vulnerability Communication Policy reflects a shift from ad hoc responses to a common framework and set of standards that guide how we approach and implement vulnerability disclosure.  In a recent Q&A, CTA CEO Michael Daniel discussed the new policy, providing his perspective on what it means for advancing cyber resilience at scale.In addition to collaborations that enhance the ways in which we communicate and manage vulnerabilities across our industry, there are additional global partnerships that exist to encourage and facilitate the sharing of information and threat intelligence across sectors and borders. The World Economic Forum Cybercrime Atlas Project is a leading example of an effective partnership among public and private organizations. The goals of the Cybercrime Atlas are threefold: map the cybercriminal ecosystem to identify choke points, disrupt cybercriminal organizations holistically through activities like dismantling infrastructure and seizing cryptocurrency, and shape policy through lessons learned to build a global, systemic operational model.In the first year of operation, Cybercrime Atlas contributors shared over 10,000 community-vetted and actionable data points, created seven intelligence packages on emerging threats for distribution to defenders, and supported two cross-border cybercrime disruption campaigns. The Cybercrime Atlas community contributed last year to INTERPOL’s Operation Serengeti, which led to the arrest of 1,006 suspects. This collaboration is a shining example of the effectiveness of public-private partnerships.By working across the public and private sectors, industry stakeholders can exchange knowledge and ideas and learn from one another, all of which enable our industry to operationalize initiatives that benefit everyone and make significant strides in the fight against cybercrime. 

Industry growth hinges on working together

Public-private partnerships are more than just a defense against a growing list of threats”, they are a catalyst for the cybersecurity industry’s growth and maturity.As the saying goes, “a rising tide lifts all boats.” And when we establish a foundation of collaboration and trust through public-private partnerships, we set higher standards for security practices that enable our collective cyber resilience to improve. As the threat landscape grows increasingly complex, the industry must embrace these partnerships as essential rather than viewing them as optional. The future of our industry depends on our ability to work together, relying on our collective expertise to protect organizations and individuals around the world.Learn more about Fortinet’s partnerships with public and private sector organizations such as the World Economic Forum, the Cyber Threat Alliance, INTERPOL, MITRE Engenuity, the Joint Cyber Defense Collaborative, and more.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3849447/public-private-partnerships-a-catalyst-for-industry-growth-and-maturity.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link