Close

Activities

EECTF analyses new and emerging cyber threats and vulnerabilities that can be identified by members in each competence sector or with joint effort.

Task Force to create a shared situational awareness and enhance the defence capabilities of each member, share information with National and International partners inside community in different ways ( restricted meetings, plenary events, confidential analysis report, ..).

EECTF has been establishing institutional collaborations outside community with some of the most relevant organizations active at the international level.

Threat Intelligence

Part of the activities are focused on threat intelligence. EECTF’s members, for each area of competence and operations or with a joint effort, analyse emerging cyber threats and vulnerabilities.

Analysis can relate Advanced Persistence Threats, new malware, threats and vulnerabilities of emerging technologies, network and infrastructure, or criminal cyber attack patterns or activities.

Outcomes of threat intelligence activities are analysis report and live demo of simulated threats, vulnerabilities and attacks.

Information Sharing

Information is exchanged according to a Traffic Light Protocol to rule the disclosure of information shared.

When information is shared four levels of confidentiality have been defined: RED, AMBER, GREEN and WHITE, with specified rules.

Confidential Information

No Disclosure Allowed

Restricted Information

Disclosure AllowFFed between Permanent Members

Shared Information

Disclosure Allowed within EECTF Community

Public Information

Any Disclosure Allowed

Should a Member not comply with the agreed code of conduct on information exchange, Founder Members are entitled to ask him to leave the Group.

Information can be shared during periodic restricted or plenary meetings, contingency meeting in case of need, through communication initiatives such as cyber news or analysis report,. Sharing can interest the entire community or only part of it according to the confidentiality of information shared.

Main information shared are related to the following topics:

  • Identity frauds such as stolen credentials, and identity thefts
  • Financial e-crime and related information like fraudulent IP addresses, money mules’ accounts
  • Malware analysis and intelligence
  • Investigation reports, technical analyses and confidential reports
  • Attacker’s’ Modus operandi, their procedures and actionable possible countermeasures

Cooperation

EECTF has been establishing institutional collaborations outside community with some of the most relevant organizations active at the international level.

EECTF is Member of the Financial Institutions Information Sharing and Analyses Center (FIISAC), Anti-Phishing Working Group (APWG), Digital Crimes Community.

In particular, has collaborate in national and International surveys, live demo e proof of concept.