When thereโs a serious aircraft incident in the United States, the National Transportation Safety Board investigates and issues an exhaustive public report and recommendations to the aviation industry.
By contrast, details about high-profile data breaches โ think Target, Home Depot, Sonyย โ are closely held, or smothered in leaks and speculation, with organizations reluctant to divulge what really happened for fear of lawsuits or damage to their brands.
But the aviation model is what infosec pros should strive for to improve IT security, Trey Ford, a private pilot and global security strategist at incident response firm Rapid7 told the SecTor conference in Toronto on Wednesday.

Public reporting would spread knowledge, increase public confidence in IT security and improve the infosec profession, he argued.
In the early years of aviation โwhen a plane crashedโฆ (pilots) worked together to forward the profession. Their failures, their lessons learned werenโtย kept secret, they were shared.โ
Similarly infosec pros have to learn to share de-personalized threat and incident information if the IT industry is ever going to get ahead of attackers, he said.
Across the industry analysts and vendors have increasingly been calling for more threat sharing as private attackers and criminal gangs become richer and nation-states bolder in their campaigns.
Some industries, such as financial, are better organized than others. In this country the Harper government has encouraged critical industries to share cyber threat information, with some more ahead than others. Similarly, in the U.S. there are an increasing number of private and public sector information sharing and action centers (ISACs) in critical industries. But that leaves huge numbers of organizations who arenโt in critical sectors alone.
Some of that gap may be filled by organizations offering to host threat information sharing platforms.
There are worries threat information sharing could lead to lawsuits, although experts say if the information has no personal identifying data it should be OK. On the other hand, wrongly warning about a particular Web site could be actionable.
Ford admits that not all the kinks have been be worked out for the kind of threat information collaboration heโd like to see. Thatโs why he encouraged attendee to at least adopt the VERISย (Vocabulary Event Recording and Incident Sharing) methodology for describing any incident in a repeatable way.
โYouโll know whatโs working and whatโs not, what incidents youโre stopping and whatโs taking a little longer to get control of. That may be more effective in the short termโ than sharing technical information like suspicious IP addresses. โMaybe today we canโt share information,โ he said, โbut that doesnโt mean you canโt prepare to.โ
Publicly sharing details of attacks is vital, he argues, to meeting threats and sharing whatโs been learned.ย Attackers will be able to adapt, he admitted, โbut I ask you to consider that every time we force the attacker to work, to buy more exploits to buy more tools, every action raises their visibility, raises their cost and makes it more difficult for them to operate.โ
In an interview Ford said CSO and CFOs not already in formal information sharing groups are starting to get together for tentative collaboration. But, he complained โitโs all behind closed doors.โ
โโI think the profession has a lot of room to mature,โ he said. โA lot of lessons we learn are going to come from sharing mistakes.โ However, โa lot of people are re-inventing the wheel.โ
โI think we have the opportunity to make this change,โ he told the conference, โand even if we canโt share (incident) data, I want you to prepare to share it. I want you toย think about how you can encode this data so at some point you can partner with data scientists, partner with statisticians to help measure risk and help the business make informed decisions.โ