Crowdsourcing your security

crowd above
Marc Forrest (CC BY 2.0)

The formal security programs at most companies include a finite number of managers and staffers. But the fact is, everyone within an organization should be responsible on some level for contributing to efforts to protect information, physical assets and other property.

Indeed, many security executives have come to rely on a broad “team” within their enterprises to bolster cyber and physical security. But they’re also increasingly looking outside for help, through threat information sharing and other collaborative efforts. For a growing number of enterprises, this all adds up to a security “crowdsourcing” strategy that enables them to have a better chance at stopping attacks and minimizing damage.

Payroll services provider Automatic Data Processing (ADP) has been participating in shared intelligence programs for cyber defense for more than four years. This includes informal sharing of data directly with other organizations and more formalized commercial and collective data sharing, for areas such as cyber defense, fraud defense and public safety, says Roland Cloutier, CSO.

“We have dedicated full-time staff that manage our technology infrastructure that automates feed-based programs and utilizes context management technologies for automation of data infusion into our security intelligence data warehouse,” Cloutier says.

“The information we collect is consumed by analysts, engineers, investigators and technologies that infuse the data into automation threat management technologies, monitoring platforms, fraud prevention technology and incident handling workflow,” Cloutier says.

ADP continuously updates its providers and partnerships to adjust to different threats and operational needs.

To continue reading this article register now

  
Shop Tech Products at Amazon