* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [CSO Perspective](https://www2.paloaltonetworks.com/blog/category/cso-perspective/) * ISC 2016: How To Improve ... # ISC 2016: How To Improve Global Cooperation In Cybersecurity [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2016%2F08%2Fcso-isc-2016-how-to-improve-global-cooperation-in-cybersecurity%2F) [](https://twitter.com/share?text=ISC+2016%3A+How+To+Improve+Global+Cooperation+In+Cybersecurity&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2016%2F08%2Fcso-isc-2016-how-to-improve-global-cooperation-in-cybersecurity%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2016%2F08%2Fcso-isc-2016-how-to-improve-global-cooperation-in-cybersecurity%2F&title=ISC+2016%3A+How+To+Improve+Global+Cooperation+In+Cybersecurity&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2016/08/cso-isc-2016-how-to-improve-global-cooperation-in-cybersecurity/&ts=markdown) \[\](mailto:?subject=ISC 2016: How To Improve Global Cooperation In Cybersecurity) Link copied By [John Davis](https://www.paloaltonetworks.com/blog/author/john-davis/?ts=markdown "Posts by John Davis") Aug 31, 2016 5 minutes [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [China](https://www.paloaltonetworks.com/blog/tag/china/?ts=markdown) [Cyber Threat Alliance](https://www.paloaltonetworks.com/blog/tag/cyber-threat-alliance/?ts=markdown) [Internet Security Conference](https://www.paloaltonetworks.com/blog/tag/internet-security-conference/?ts=markdown) I recently gave the opening keynote presentation at China's Internet Security Conference (ISC) 2016. ISC is China's largest international cybersecurity conference and was held from 16--17 August in Beijing. The conference was open to the Chinese media and covered by CCTV and Xinhua. It was attended by roughly 8,000 people from several countries (mostly China, Korea, Russia, the U.S. and some European nations). This blog post will provide insight into what I shared with the international audience during my keynote address. One of the topics that ISC asked me to address in my remarks was "Global Cooperation in Cybersecurity." During the keynote, I discussed three important factors that I believe can help to improve global cooperation in cybersecurity. These factors apply to global cooperation, that is government to government, company to company, and between governments and companies. ### First factor: Transparency The first factor is transparency. Better transparency is critical to improving cooperation at all levels. I provided the audience with an example of how an increase in transparency between the cyber units of international militaries contribute to increased stability, reduced uncertainty, and a smaller chance of misperception, miscalculation, or even making a mistake in the cyber environment that might escalate into something even more problematic in the physical environment. I shared an example about transparency from my experience in my current role at Palo Alto Networks and talked about how we share cyberthreat information among competing companies. Palo Alto Networks is one of eight companies, all competitors, which have formed an organization called the [Cyber Threat Alliance (CTA)](http://www.cyberthreatalliance.org/). In the CTA, cyberthreat information is considered a public good to be shared rather than an individual commercial commodity to be hoarded. To become a member of the CTA, each company must agree to do two things. First, they must agree to contribute unique malicious code or signatures, not found in existing published reports, into a common database that all eight companies can access. Second, and even more important and unique, they must agree to do something with the information that is put into the database. They must agree to load this cyberthreat information into their own internal security controls and defensive posture, as well as that of the clients that they serve. What is the result of this kind of transparency between competing companies? Using Palo Alto Networks as an example, what this means is that not only are our customers protected from the cyberthreats we see on a global basis, but they are also protected from the cyberthreats that the other seven CTA member companies see globally on a daily basis. This demonstrates an amazing dynamic that creates a growing, global ecosystem that stretches a self-learning, self-healing protective fabric across all organizations involved. To be clear, both of my examples are just strong first steps. We must be realistic and practical. We may never achieve full transparency, but in my experience, that is okay because even limited transparency can help to improve cooperation. The examples I provided demonstrate that increased transparency is a good first step in improving cooperation on a more global basis. ### Second factor: Trust Improving trust is essential to improving cooperation across the public and private sectors and between nations. I readily admit this can be very difficult. In many cases it will take a great deal of time and patience and, in most cases, cannot occur without the strong support of any organization's leadership. It's important to note that trust does not even begin to build without the "good faith" first attempts to demonstrate increased transparency. In the CTA example shared above, progress in building trust was only possible because of senior leadership's emphasis and support. ### Third factor: Teamwork With better transparency comes better trust, and with better trust comes the opportunity for teamwork and effective partnerships. This is the final ingredient to successful cooperation, whether government to government, company to company, or between governments and companies. While complete alignment and teamwork on all issues is an unrealistic expectation, there is an opportunity to foster teamwork based on the common self-interests of the various entities involved. This is a process that takes time and must be carefully built step by step. I believe there is a real possibility of building toward a team approach to cybersecurity because, in my experience, it truly takes teamwork and effective partnerships to win against modern cyberthreats. Some may doubt this is possible, and I have no illusions of the level of difficulty, but I explained why I believe there is cause for action. ### Will Global Cooperation in Cybersecurity Become the Standard? In the same way that many countries around the world have taken a team approach to countering piracy, child pornography, proliferation of dangerous weapons, and terrorism, I believe that the seriousness of the cyberthreat trend will catch up to, and even possibly eclipse, all of these other global problems in which a team approach across most of the world's responsible nations has already happened. Why would global cooperation in our collective approach to the cyberthreat problem be any different if -- or when -- we get to that stage? *** ** * ** *** ## Related Blogs ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### It's Time to Get off the Treadmill: Why You Should Understand Adversary Playbooks](https://www2.paloaltonetworks.com/blog/2018/09/cso-time-get-off-treadmill-understand-adversary-playbooks/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Davos 2018: Hot Topics in Cyber Risk](https://www2.paloaltonetworks.com/blog/2018/02/cso-davos-2018-hot-topics-cyber-risk/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [#### New Report: The State of Cybersecurity in Asia-Pacific](https://www2.paloaltonetworks.com/blog/2017/07/cso-new-report-state-cybersecurity-asia-pacific/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Deterrence in Cyberspace: A Greater Role for Industry (Part One of a Three Part Essay Series)](https://www2.paloaltonetworks.com/blog/2017/05/cso-deterrence-cyberspace-greater-role-industry-part-one-three-part-essay-series/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### The Cyber Threat Alliance: How Far We've Come and Where We're Going](https://www2.paloaltonetworks.com/blog/2017/02/cso-cyberthreat-alliance-far-weve-come-going/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [#### Cyber Threat Alliance Expands: Working Together to Prevent Cyber Breaches](https://www2.paloaltonetworks.com/blog/2017/02/cyber-threat-alliance-expands-working-together-prevent-cyber-breaches/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language