Ingenuity and Information Sharing
The current progress in Congress on the Cyber Intelligence Sharing and Protection Act (CISPA), which would establish an information exchange between the Intelligence Community and the private sector, is encouraging news. Effective and timely sharing of information and intelligence remains vital in preventing terrorist attacks and maintaining American security at home and abroad.
The National Strategy for Information Sharing and Safeguarding in December 2012 lays the framework for developing, implementing, and integrating policies, processes, standards, and technologies to promote secure and thoughtful information sharing among stakeholders across all levels, both inside and outside of government, domestic and abroad.
The Strategy identifies five principal goals:
- Drive Collective Action through Collaboration and Accountability
- Improve Information Discovery and Access through Common Standards
- Optimize Mission Effectiveness through Shared Services and Interoperability
- Strengthen Information Safeguarding through Structural Reform, Policy, and Technical Solutions
- Protect Privacy, Civil Rights, and Civil Liberties through Consistency and Compliance
This challenge relies heavily on both private and public entities to achieve success.
“…We must tap the ingenuity outside government through strategic partnerships with the private sector, nongovernmental organizations, foundations, and community-based organizations… to enhance opportunities for engagement, coordination, transparency, and information sharing.” –National Security Strategy, May 2010
In particular, businesses in the private sector have the opportunity to make an enormous impact. To face these complex challenges, the best solutions will be found in individuals with innovative ideas, good business practices and the desire to make a difference. The private sector can bring this necessary expertise. Take, for example, our nation’s largest banking institutions. These businesses have created a massive system that shares information instantaneously, protects customer data, combats fraud and identity theft, and complies with privacy regulations. Their livelihoods depend on it. Models like this bring great new ideas to Government.
With both cyber threats and technology evolving almost daily, businesses that have adaptability and flexibility to help the Government share information are critical in meeting the high-stakes threats that we face today.