And so, to this end, the National Institute of Cybersecurity is working very closely with all these threat intelligence-gathering stakeholders to establish the norm. So that the private sector computer emergency response team, which is entirely private sector, can interoperate with more defense or administration or critical infrastructure oriented, so they share not just the threat intelligence, which they already share, but also the personnel and some of the flows.

Keyboard shortcuts

j previous speech k next speech