CTI Sharing Practices and MISP Adoption in Finland’s Critical Infrastructure Protection

Authors

  • Katja Henttonen Laurea University of Applied Sciences, Espoo, Finland
  • Jyri Rajamäki Laurea University of Applied Sciences, Espoo, Finland https://orcid.org/0000-0003-4798-2462

DOI:

https://doi.org/10.34190/eccws.23.1.2352

Keywords:

Cyber threat intelligence, CTI sharing, critical infrastructure, MISP

Abstract

Cyber Threat Intelligence (CTI) sharing is crucial for safeguarding organisations and securing national critical infrastructure. This study delves into the CTI-sharing practices of large, safety-critical Finnish organisations, with a specific interest in the deployment and potential of the Malware Information Sharing Platform (MISP). We gathered insights through qualitative interviews with cybersecurity experts from key sectors: energy, healthcare, and transportation. Our findings reveal that a significant proportion of regional CTI data is still shared through manual methods such as email and chat. While these systems are generally viewed positively, they are also understood to be prone to delays and inaccuracies. The interest in utilising MISP is rising in Finland, yet its implementation is still in the nascent stages. Organisations are looking towards the National Cyber Security Center to lead the establishment of a national MISP instance. The benefits of adopting a national MISP framework could be further amplified by organisations joining Europewide industry-specific MISP instances or leveraging MISP to share threat intelligence with their supply chain partners. However, challenges remain, particularly in balancing threat data sharing with European data protection laws, motivating community contributions, and standardising CTI-sharing tools and practices within a country.

Downloads

Published

2024-06-21