Google Search
Prof. Dr. Michael Grüning
Dekan
+49 (0)3677 69-4011
Telefax: +49 3677 69-4203
Oec (Helmholtzplatz 3) Raum 4021
Empirical Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland
The security of IT systems is one of the key success factors of digitization. However, often only a few companies and public authorities have sufficient resources to ensure adequate IT security levels at all times. One option for reducing resource problems is more intensive automation of IT security management subtasks. Threat Intelligence Sharing Platforms can be an important building block for this. These are Internet-based platforms for the cross-organizational exchange of threat and security information. Threat Intelligence Sharing Platforms support the collection of data from various sources, their aggregation and cooperative evaluation, as well as the export of analysis data to IT systems of companies, authorities and universities. Various manufacturers offer solutions for this purpose, sometimes with considerable differences in functionality.
The aim of the study is to investigate how intensively Threat Intelligence Sharing Platforms are used in Germany, Austria and Switzerland and how exactly they are used in companies, public authorities and universities. For this purposea team of researchers from the Technical University of Ilmenau and the University of Innsbruck, in collaboration with the Federal Information Technology Center (ITZBund), will conduct an online survey in the third quarter of 2022. In particular, CISOs, CIOs and/or other persons responsible for information security are to be surveyed.
After evaluating the survey results, we expect to be able to describe the status quo of the use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland in more detail. Among other things, the following research questions will be answered:
Based on the findings of the study, recommendations for the use of threat intelligence sharing platforms will be developed. This should enable IT security managers to use these platforms in a more targeted and efficient manner.
The following target groups can benefit from the results of the study:
Contact: