Understanding collective defense as a route to better cybersecurity

A person using a smartphone with a cybersecurity lock symbol appearing over it.
(Image credit: Shutterstock / VideoFlow)

In many ways, cybersecurity is characterized by very insular priorities. Focused on protecting their own network perimeters, systems and data, organizations quite correctly develop highly tailored and personalized strategies. As a result, businesses that outwardly appear very similar, competing in the same industry for the same customers, may have very different approaches to prevention, mitigation and recovery.

Granted, the entire cybersecurity ecosystem is supported by a huge variety of vibrant communities where cooperation plays a fundamental role, but the idea that organizations can cooperate at a deeper level to deliver ‘collective defense’ is less commonplace.

In cybersecurity terms, collective defense means organizations share the most useful resources, information and processes to improve resilience between otherwise unconnected entities. For many people, it will be more familiar as a geopolitical and military concept, with NATO Article Five, for example, stating that an attack on one member state will be treated as an attack on them all. This sends a clear and unifying message to potential adversaries while adding significantly to the resources available to each individual country.

Organizations invoking collective defense to protect their IT and data assets will usually focus on sharing threat intelligence and coordinating threat response actions to counter malicious threat actors. Success depends on defining and implementing a collaborative cybersecurity strategy where organizations, both internally and externally, work together across industries to defend against targeted cyber threats. Done well, it can be extremely effective.

Jason Keirstead

Vice President of Collective Defense at Cyware.

Building momentum

But how is this playing out in the real world? There are a growing number of examples to draw on, including the collaborative legal action launched last year by Microsoft, Fortra LLC and Health-ISAC. This alliance targeted actors that deployed cracked versions of Cobalt Strike or those that blatantly violated Microsoft’s terms of use, particularly the malicious deployment of its copyrighted APIs. As media analysis at the time pointed out, “this disruption won’t halt cybercriminal operations, but it will put a strain on their resources.” The point is, collectively, organizations are better placed to detect, challenge and dismantle the infrastructures that underpin cyber security risks.

In its most recent Digital Defense Report, Microsoft also focused on the need for wider efforts to improve collective cyber resilience. For example, faced with sophisticated cyber threats, the report points out that collaboration and a united front are vital to building a more secure digital landscape. In this context, open-source and supply chain security vulnerabilities could be significantly improved through the use of collective action.

Take the Open Source Security Foundation (OpenSSF), for example, a cross-industry forum dedicated to addressing new security challenges. Its role includes developing frameworks to address challenges, such as improving comprehension of supply chain threats and efficient strategies for mitigating them.

Other organizations are assisting in the support of collective defense as well, such as the Open Cybersecurity Alliance (OCA), a nonprofit coalition under the umbrella of OASIS Open. The OCA supports an open ecosystem where cybersecurity tools interoperate without the need for custom integrations, helping cyber defenders work together more effectively by reducing technical barriers to sharing.

On a government level, regulatory guidelines such as the SEC’s cyber incident reporting regulations, the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) and the EU Cybersecurity Act are another important part of the collective defense picture. What these various initiatives have in common is their emphasis on promoting a collaborative, community-focused approach to strengthening the digital ecosystem against ever-changing cyber risks.

From theory to implementation

Putting this into practice requires organizations to commit to coordinating their cybersecurity strategies to identify, mitigate and recover from threats and breaches. This should begin with a process that defines the stakeholders who will participate in the collective defense initiative. These can include anything from private companies and government agencies to non-profits and Information Sharing and Analysis Centers (ISACs), among others.

The approach will only work if it is based on mutual trust, so there is an important role for the use of mechanisms such as non-disclosure agreements, clearly defined roles and responsibilities and a commitment to operational transparency. Operationally, secure, real-time communication channels are key to ensuring threat and defense intelligence information can be shared. Similarly, the community should establish processes to disseminate indicators of compromise (IoCs), tactics, techniques and procedures (TTPs), backed by best practice information and incident reports.

Collective defense communities can also look to the Cyber Fusion Centre model to bring together relevant security functions, including threat intelligence, security automation, threat response, security orchestration and incident response, in a cohesive approach. A practical example of how this can work is when vulnerability management and incident response teams work together to deal with a bug exploitation incident more effectively than might be possible by working in silos.

Given the challenging range of cybersecurity risks faced today, collective defence represents not only a common-sense approach to improving protection but can also transform the security posture of organisations currently trying to go it alone. As such, it is a model that perfectly fits the notion that “the whole is greater than the sum of its parts.”

We list the best cloud antivirus.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Jason Keirstead, Vice President of Collective Defense at Cyware.

Read more
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An abstract image of digital security.
Adopting a Cyber Fusion approach to ensure NIS2 compliance
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
Abstract image of cyber security in action.
Four key questions to strengthen your cyber threat detection strategy
Latest in Pro
ai distillation
5 myths about agentic AI and why your company should embrace the tech
Representational image of a shrouded hacker.
Adapting the UK’s cyber ecosystem
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
Context Windows
Why are AI context windows important?
BERT
What is BERT, and why should we care?
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Toni Collette in Hereditary
Everything leaving Netflix in April 2025 – from the scariest movie ever made to a beloved DreamWorks animation with 99% on Rotten Tomatoes
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Close up of Leica M11-P viewfinder
I wince at the prospect of the rumored Leica M11-V – here's why