Improving information sharing across the Atlantic
Connecting state and local government leaders
Agreement on data handling practices combined with advanced technologies can create a trusted threat intel sharing environment between the U.S. and its European allies.
What: “Integrating and Analyzing Data Across Governments -- The Key to 21st Century Security: Insights From a Transatlantic Dialogue,” a report by the IBM Center for The Business of Government
Why: Greater sharing of threat intel data across nations and sectors could help governments understand and respond to an increasingly complex set of threats – if they can trust the data. The report examines how stakeholders can create a trusted data sharing environment.
Findings: Based on conversations with current and former government leaders and other stakeholders from the U.S. and Europe, the report finds that an important factor in a trusted environment is ensuring all parties understand how the data will be handled and that it won’t be altered. Successful relationships also feature bi-directional information sharing by both agency leaders and end users.
Siloed, non-interoperable data can be difficult to share, but building more mature analytics programs and systems can help solve that problem. New analytics technologies such as artificial intelligence and blockchain platforms can improve data integrity, interoperability, privacy and analysis speed as well as ensure secure access to data.
The introduction of the General Data Protection Regulation places data sharing between the EU and U.S. at a crossroads, the report points out. “Governments can limit information sharing and collaboration to reduce privacy and security risks, or invest in technology that builds protective protocols into the sharing process,” the report reads.
Verbatim: "Governments … must be specific about the content to be shared, its handling, and its acceptable use. Answering these basic questions can help resolve some challenges faced by the U.S., where agencies may try to solve the hardest problem in sharing and never develop a process that gets to basic 'what, when, and who' details."
Read the full report here.
NEXT STORY: Building NYC’s secure cyber future