This CISO cites five factors that leaders may be too embarrassed or denialistic to address when tackling a global problem…

Chuan Wei Hoo, Chief Information Security Officer, StarHub

Several factors can hinder effective information sharing, including:

  • Commercial, regulatory, and legal concerns: Firms may hesitate to share details of their vulnerabilities due to fears of reputational damage, competitive risks, or legal liabilities, especially with evolving regulations.
  • Silos: Information flow is often limited by organizational and sectoral silos, excluding smaller or non-traditional players that could benefit most from collaboration.
  • Timing: Information is often shared reactively after an incident, leaving businesses with little time to respond proactively.
  • Workforce shortages: Smaller organizations, lacking cybersecurity expertise, are often the most vulnerable, yet the least equipped to share or act on critical information.
  • Human factors:Trust is essential for effective information sharing, but factors like enforcement and the reluctance to appear vulnerable can inhibit transparency.

Key principles for this new approach include:

  • Proactive capability building: Large entities, including governments and enterprises, should take the lead in sharing actionable security insights and tools with their suppliers, especially focusing on vulnerability management, incident response planning, and identity access controls.
  • Inclusivity across networks: Information sharing networks must become more inclusive by fostering connections within supply chains and creating opportunities for smaller organizations to contribute and benefit from shared knowledge. This could involve forming new supplier communities or improving collaboration across sectors.
  • Leveraging technology for scale: This means moving towards a ‘digital commons’, where common standards for information sharing and real-time monitoring can create a shared view of security postures across networks, allowing for more efficient allocation of security resources and minimization of duplicated efforts.