Enhancing Cyber Security: The Role of Networking, Coordination, and Trusted Information Sharing in Organizational Resilience
DOI:
https://doi.org/10.24203/0zwra472Keywords:
Cybersecurity, Networking, Coordination, Information Sharing, Security Measures, Security Posture, Incident Response, Threat Intelligence, Network Segmentation, Access Control, Insider Threats, Information Overload, Standardization, Collaboration Defence, Competing Priorities, Trust Relationships, Data Breach, Vulnerability AssessmentAbstract
Organizations must take proactive measures to strengthen their cybersecurity posture as cyber-attacks continue to develop and become more sophisticated. Networking, coordination, and the sharing of trustworthy information among entities and organizations have become essential tactics for achieving this goal. This article gives a general overview of how networking, coordination, and trusted information sharing can improve an organization's cybersecurity posture. It covers the most recent advancements and trends in this field and analyses the advantages, difficulties, and best practices for putting these ideas into effect. The article's conclusion emphasizes the necessity of a cooperative, all-encompassing strategy for cybersecurity that incorporates networking, coordination, and reliable information exchange.
References
NIST. (2015). Framework for improving critical infrastructure cybersecurity. Retrieved from https://www.nist.gov/cyberframework
Center for Internet Security (CIS). (2021). The CIS Controls. https://www.cisecurity.org/controls/
CISA. (2021). Network Security. CISA. https://www.cisa.gov/news-events/news/home-network-security
NCCoE. (2021). Network Traffic Analytics. https://www.nist.gov/publications/network-security-traffic-analysis-platform-design-and-validation
NIST. (2018). NIST SP 800-53 Rev. 4: Security and Privacy Controls for Federal Information Systems and Organizations. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
SANS. (2021). Intrusion Detection and Prevention. https://www.sans.org/blog/favoring-frameworks-for-intrusion-detection-and-prevention/
Cisco. (2020). Security resilience for the unpredictable https://www.cisco.com/c/en/us/products/security/network-security.html
CISA. (2020). Alert (AA20-302A) Ransomware Activity Targeting the Healthcare and Public Health Sector. https://us-cert.cisa.gov/ncas/alerts/aa20-302a
IBM. (2021). 2021 Cost of a Data Breach Report. https://www.ibm.com/security/data-breach
Ponemon Institute. (2020). 2020 Cost of Insider Threats Global Report. https://www.exclusive-networks.com/uk/wp-content/uploads/sites/28/2020/12/UK-VR-Proofpoint-Report-2020-Cost-of-Insider-Threats.pdf
Verizon. (2021). 2021 Data Breach Investigations Report. https://enterprise.verizon.com/resources/reports/2021-data-breach-investigations-report.pdf
Deloitte. (2019). Navigating cybersecurity. https://www2.deloitte.com/uk/en/blog/cyber-risk/2023/navigating-cyber-security.html
Gartner. (n.d). The IT Roadmap for Cybersecurityhttps://www.gartner.com/en/information-technology/trends/the-it-roadmap-for-cybersecurity
McKinsey. (2023). Building a cybersecurity culture. https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/building-a-culture-that-grows-with-the-business-lessons-from-tibber
PwC. (2018). Global State of Information Security Survey 2018. https://www.pwc.com/sg/en/publications/assets/gsiss-2018.pdf
Ponemon Institute. (2018). The Cyber Security Readiness Report. https://www.keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf
Cloud Security Alliance. (2019). Top Threats to Cloud Computing. https://cloudsecurityalliance.org/press-releases/2022/06/07/cloud-security-alliance-s-top-threats-to-cloud-computing-pandemic-11-report-finds-traditional-cloud-security-issues-becoming-less-concerning/
Cisco. (2019). CISO Benchmark Study: 2019 Report. https://search.cisco.com/search?query=CISO%20Benchmark%20Study:%202019%20Report&locale=enUS&bizcontext=&cat=&mode=text&clktyp=enter&autosuggest=false&istadisplayed=false&tareqid=&categoryvalue=
Tripwire. (2019). Why Cyber Security is Key to Enterprise Risk Management for all Organizations. https://www.tripwire.com/state-of-security/cyber-security-enterprise-risk-management-erm-organizations
Ponemon Institute. (2018). 2018 Cost of a Data Breach Study: Global Overview. https://www.intlxsolutions.com/hubfs/2018_Global_Cost_of_a_Data_Breach_Report.pdf
NIST. (2012). Computer Security Incident Handling Guide. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
Cyber Threat Alliance. (2017). Sharing is Caring: Why the Industry Must Work Together to Combat Cybercrime. https://cyberthreatalliance.org/wp-content/uploads/2017/05/CTA_Sharing-is-Caring.pdf
Center for Internet Security. (2018). CIS Controls Version. https://www.cisecurity.org/controls/cis-controls-list/
National Cybersecurity Center of Excellence (NCCoE). (2019). Information Sharing. https://csrc.nist.gov/glossary/term/information_sharing
NIST. (2016). Guide to Cyber Threat Information Sharing. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-150.pdf
Cyber Threat Alliance (CTA). (2019). Improving Cybersecurity Information Sharing: A Call to Action. https://www.cyberthreatalliance.org/improving-cybersecurity-information-sharing-a-call-to-action/
Center for Internet Security. (2021). Information Sharing. https://www.cisecurity.org/ms-isac
NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf
Department of Homeland Security. (2020). Information Sharing and Analysis Organizations. https://www.cisa.gov/information-sharing-and-analysis-organizations-isaos
NIST. (2017). Cybersecurity Framework Version 1.1. https://www.nist.gov/news-events/events/2018/04/webcast-cybersecurity-framework-version-11-overview
Cisco. (2020). Firewall and intrusion detection and prevention system. https://www.cisco.com/c/dam/global/en_au/assets/pdf/at-a-glance-c45-735895.pdf
MITRE. (2019). Vulnerability assessment and penetration testing. https://attack.mitre.org/tactics/TA0005/
NIST. (2017). Digital identity guidelines. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf
SANS Institute. (n.d). Security awareness training. https://www.sans.org/security-awareness-training
Symantec. (2023). Data backup and recovery. https://knowledge.broadcom.com/external/article/159322/backup-and-restore-dcs-database-for-disa.html
CISA. (2023). Understanding patches and software updates. https://www.cisa.gov/news-events/news/understanding-patches-and-software-updates
International Organization for Standardization. (2013). ISO/IEC 27002:2013 - Information technology - Security techniques - Code of practice for information security controls. https://www.iso.org/standard/54533.html
Verizon. (2020). 2020 Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/2020-data-breach-investigations-report.pdfx
Ponemon Institute. (2019). Cost of a Data Breach Report 2019. https://www.ibm.com/downloads/cas/RDEQK07R
Accenture. (2019). Cybercrime Costs Projected to Reach $5 Trillion Annually by 2024. https://newsroom.accenture.com/news/cybercrime-could-cost-companies-us-5-2-trillion-over-next-five-years-according-to-new-research-from-accenture.htm
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Duncan Nyale, Charles Katila
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The articles published in International Journal of Computer and Information Technology (IJCIT) is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.