A U.S. agency hopes to gather security researchers, software vendors and other interested people and reach consensus on the sticky topic of how to disclose cybersecurity vulnerabilities.
Beginning in September, the U.S. National Telecommunications and Information Administration (NTIA) will host a series of meetings intended to improve collaboration among security researchers, software vendors and IT system operators on the disclosure of, and response to, vulnerabilities.
The first NTIA-hosted meeting will be Sept. 29 at the University of California, Berkeley, School of Law. Registration is open to all who want to participate, and the meeting will also be webcast, NTIA said.
Some researchers' public disclosures of previously unknown vulnerabilities has been controversial, with some software vendors complaining the information can help hackers compromise systems before they can be patched. Many researchers believe that public disclosure gives software vendors an incentive to issue patches.
But the NTIA sees potential for a consensus to develop, with strong security as the goal, said deputy assistant secretary Angela Simpson. When a researcher discovers a vulnerability, "we'd like to promote collaboration, rather than antipathy, between the researcher and the vendor," she said.
While the debate over vulnerability disclosure isn't new, it is growing in importance as many industries find themselves selling products with software at their cores, Simpson said.
NTIA hopes the participants can develop a set of "high-level principles for successful collaboration," she added. Participants in the process, not the NTIA, will determine the outcome, she added. "The community holds the pen."
In recent years, the agency has hosted a series of so-called multi-stakeholder meetings related to developing privacy standards for mobile apps, drones and facial recognition technology. Those processes have produced mixed results, with some privacy advocates complaining the meetings were too focused on business, and not consumer, needs.