THINKPolicy #1: Fortifying our Digital Defenses

Share this post:

In IBM’s first THINKPolicy perspective, cybersecurity expert Andrew Tannenbaum urges Congressional action to strengthen America’s digital defenses.

By Andrew Tannenbaum, IBM Cybersecurity Counsel


dl-boxcloud-com4With massive new data breaches being reported on what feels like a daily basis, businesses and consumers are increasingly concerned that their sensitive information could be exposed and exploited. Cybercrime and data hacks are fundamental threats to security and privacy, and their frequency is on the rise. The FBI recently announced that economic espionage cases surged 53 percent in the past year alone.

So, in IBM’s first THINKPolicy perspective, we are addressing a core data challenge of our time – cybersecurity – and offer the following recommendation to policy makers:

  • Pass a Cyber Threat Info Sharing Bill – The U.S. Senate is poised to take up legislation this fall that would help public and private sector cybersecurity professionals rapidly share technical details on evolving cyber threats, and use that information to better secure their networks. Hackers operate in sophisticated, well-organized networks, and use secluded areas of the Internet to stage their attacks. By passing the Cybersecurity Information Sharing Act (CISA) and sending a final cybersecurity bill to the President’s desk, Congress will help security professionals better coordinate their defenses against these online criminal organizations. IBM strongly supports CISA, and companion bills passed earlier this year by large bipartisan margins in the House, because they address three essential factors that will foster more sharing of cyber threat info: strong privacy protections, legal clarity and protections for those who follow the privacy requirements, and clear “rules of the road” for sharing cyber threats through a civilian government agency.

According to the United Nations, 80% of cyber crimes are carried out by highly-organized criminal networks that actively share tools and information. This only underscores the need for better sharing and coordination between the professionals working to thwart them.


IBM is taking concrete steps to help our clients, governments and partners address evolving cyber threats. Earlier this year, we launched a new platform – the X-Force Exchange – that allows cybersecurity experts to access a vast database of cyber threat data and share insight into the latest attacks. Since its launch, more than 2,000 organizations have been participating in the exchange. It’s a good start, but only legislative action can provide the legal clarity necessary to scale cyber threat info sharing to the level required.

And as we look ahead to the future, this exchange of threat data will be made even more powerful through the application of cognitive technologies, which can study cyber attacks happening in real time to help security professionals adapt even faster to rapidly evolving threats.

Unfortunately, certain groups have erroneously equated cyber threat information sharing with government surveillance and labeled it a threat to individual privacy. As I stated recently in the Wall Street Journal, this is a red herring. Cybersecurity experts have thoroughly and repeatedly explained that they do not want or need anyone’s personal information when sending or receiving alerts about cyber threats. What they do need is technical data that can be quickly integrated into their network defenses, such as lines of malware code, malicious IP addresses and information about product vulnerabilities and the techniques used to exploit them. The threat information sharing bills in the House and Senate are appropriately focused on that type of technical information.

In fact, CISA and the companion House bills are strong, measures that affirmatively advance the cause of privacy.  First and foremost, they put entities in a stronger position to defend against hackers who are brazenly stealing massive amounts of personal and confidential information, which is the real privacy crisis at issue. The bills also add a range of new privacy, transparency, and oversight protections that do not exist today. Instead of sharing threat indicators under an outdated and unclear legal framework – as occurs today – entities will now have legal clarity about what is appropriate to share (narrow categories of threat indicators) and how to do so while protecting privacy (by removing any incidental personal information, for example). Increased oversight and transparency will shed new light on the effectiveness of such sharing and any privacy impact.  All of this is a net gain for privacy.

The time to act was yesterday. We cannot continue allowing cyber criminals to break into our systems, steal our data and disrupt our way of life. IBM urges Congress to address the cybersecurity challenge and, in doing so, foster the confidence businesses and consumers deserve when participating in the digital economy.


Media Contact:
Adam R. Pratt
Ph: (202) 551-9625

More stories

Bias in AI: How we Build Fair AI Systems and Less-Biased Humans

Artificial intelligence (AI) offers enormous potential to transform our businesses, solve some of our toughest problems and inspire the world to a better future. But our AI systems are only as good as the data we put into them.

Continue reading

A New Public-Private Partnership to Advance Cybersecurity in France

IBM today opened its new Security Operations Center (SOC) in Lille, France. The SOC offers security incident and response services to organisations that are at the heart of the French society and economy. Operating 24 hours a day, seven days a week, the security center team will monitor the latest security events, assess their potential impact […]

Continue reading

Four decades. Nine jobs. One company. Meet Albert, IBM’s first-ever new collar employee.

Nearly 40 years before the first class of P-TECH students graduated high school with an associate’s degree and a pathway to a new collar career in tech (and before the term “new collar” was even coined), Albert Schneider was on his way to becoming the first new collar IBMer. Albert began working full time after […]

Continue reading