Events 0
En
Ua
Events 0
Search result:
Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape- image 1

Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape

On April 2, iIT Distribution together with DData Consulting held a closed round table “Cyber incidents without borders: how an ecosystem for data exchange is formed”, gathering cybersecurity leaders from the telecommunications, industry, transport, and insurance sectors. The discussion was moderated by Kyrylo Honcharuk, Ukraine Country Leader Cyber Future Foundation and CTO of the Year in the EMEA region.

During the discussion, participants discussed key risks businesses face today, approaches to responding to cyber incidents, and the role of information exchange between companies.

Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 1
DISCUSSION TOPICS

Key insights from the discussion

  • Modern cyber incidents are never isolated
    No incident today is limited to a single company. Attacks increasingly affect partners, contractors, and entire supply chains.
  • The perception of cyberattacks has evolved from a reputational disaster to a sign of importance
    Being targeted by an attack is no longer necessarily seen as a reputational crisis; it can also be perceived as an indication of a company’s importance to a country’s economy.
  • Lack of trust in regulators is a key barrier to information sharing about incidents
    A fundamental problem is the lack of trust in regulators: companies are reluctant to report incidents because the same regulator may later impose penalties or fines.
  • The concept of “security through obscurity” no longer works
    Modern systems must remain secure even if their architecture or operating principles become known to potential attackers.
  • Effective information sharing requires independent, industry-driven centers
    In mature markets, independent, non-profit information sharing centers (ISACs) are established within industries. These organizations are funded by the industry itself and operate independently of regulators.

Challenges of sharing information about cyber incidents

One of the key conclusions was that the market currently lacks a unified center or platform for alerting businesses about cyberattacks and their cross-industry impact. Companies often learn about incidents only after the fact—from news reports or the market—when responding becomes much more difficult.

At the same time, information sharing about cyber threats already occurs at different levels. As a distributor, iIT Distribution receives signals about incidents and emerging risks from clients, partners, and vendors and is ready to share this information to help businesses respond to threats more quickly.

An important role in this process is played by threat intelligence generated by vendors. Threat analytics and global attack data enable organizations to identify new attack scenarios earlier and warn about potential risks before they spread to other companies or industries.

TECHNOLOGICAL SOLUTIONS

Demonstration of cyber protection in action: CrowdStrike and Vectra AI

In this context, special attention was paid to technologies that help work with the attack surface comprehensively. Platforms like CrowdStrike and Vectra AI combine signals from various sources and enable faster detection and analysis of incidents. At the same time, it became evident that isolated SOCs no longer provide the full picture. Effective protection begins where there is event correlation between different security systems and a shared understanding of the incident.

One example of such an approach is the integration of Vectra AI with CrowdStrike Falcon Next-Gen SIEM. It combines network signals, data from endpoints, cloud services, and identity systems, helping security teams prioritize threats more quickly and respond to attacks more promptly.

Cybersecurity has long ceased to be an internal issue of a separate company. Today, it is a shared area of responsibility across industries, where effective protection depends on the ability of organizations to share information, analyze attack contexts, and act together.

Because in cybersecurity, the winner is not the one who first suffered from an attack, but the one who first drew conclusions.

PHOTO REPORT
PHOTO REPORT

Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 2
Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 3
Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 4
Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 5
Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 6
Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 7
Cyber Incidents Without Borders: How an Ecosystem for Data Sharing Is Taking Shape - image 8
NEWS

Current news on your topic

All news
All news