The newsletter subscribers rated "product vulnerability reporting" and "cyber security information sharing" as the highest in satisfaction, averaging 4.47 and 4.4 respectively, with around 90%
positive feedback. "Promoting cyber security awareness" ranked the third with an average score of 4.37 and similar positive feedback. Even the lower-rated "report and respond cyber security
incidents" service received 4.18 in score and 80% positive feedback.
Alliance members rated "report and respond cyber security incidents" as the highest in score of 4.54, with 100% positive feedback. It is followed by "promoting cyber security awareness", with
an average score of 4.52 and 95% positive feedback. "Cyber security information sharing" ranked the third with an average score of 4.42 and 90% positive feedback. Even the lowest rated
"malicious file detection service" scored above 4.2 and garnered 80% positive feedback.
Overall, the alliance members rated "cyber security information sharing", "report and respond cyber security incidents", and "promoting cyber security awareness" higher than the newsletter
subscribers. On the other hand, satisfaction with "product vulnerability reporting" was slightly higher among the newsletter subscribers.
The average satisfaction score of the newsletter subscribers on the overall service quality of TWCERT/CC is 4.15, with 79% positive feedback. The overall satisfaction
score for technical support is 4.08, with 77.6% positive feedback.
The average satisfaction score of the overall service quality of TWCERT/CC among the alliance members is 4.36, with 90.1% positive feedback. The overall satisfaction score of technical support
is 4.22, with 85.7% positive feedback. The score of service quality and the technical support in the alliance members are slightly higher than that in the newsletter subscribers, with 10% and
5% higher satisfaction rate, respectively.
The newsletter subscribers showed over 80% trust in TWCERT/CC, with an average score of 4.1 for both trust and perceived service value, both represents an increase from last year.
The alliance members exhibited even higher trust in TWCERT/CC, with above 90% positive feedback and average scores of 4.51 for trust and 4.46 for service value. This indicates a notable
improvement in trust and perceived value among the alliance members compared to the newsletter subscribers, with particularly significant increases in the "Totally agree" category.
For TWCERT/CC's forums and training sessions, 84.9% of newsletter subscribers expressed an expectation for "downloadable conference or course content summaries". Additionally, 66% hope for more "Chinese speakers or instant translation services", while 23.7% wish to see "more cybersecurity information issues" addressed, and 16.1% would like more international speakers. The alliance members share similar expectations to the newsletter subscribers, with a slightly higher demand for downloadable content summaries.
For the information released by TWCERT/CC, the overall attention score of newsletter subscribers is 3.7, 19.2% of the respondents always follow the latest news from TWCERT/CC, and 39.3% of the respondents often focus on it, less than 7 % rarely or never concern about the TWCERT/CC" s news.
The overall attention score of alliance members has increased by 0.2, reaching 4.07, and most of them are always concerned and often concerned (75.8% in total).
Newsletter subscribers want to learn more about cyber security issues, with the highest proportion of "security threats and protection trends" (88%). "Incident response process
and practices" accounted for 71.4%, and about 60% of the respondents needed to introduce "latest cyber security standards" and "security topics on innovative tech (such as 5G, Vehicle, AI, etc.)".
For the alliance member, there is also a significant increase in the content of "security threats and protection trends" (97.7%), followed by "incident response process and practices" with 81.8%.
The newsletter subscribers indicated that they usually obtain information about cyber security through "newsletter" (66.6%) and "official website" (61.7%), and 53% through
"seminars or courses".
For the alliance members, "the official website" is the first choice (76.5%) to follow the information from TWCERT/CC. Then would be 72% of newsletters and 68.9% of seminars or courses.
Most of the newsletter subscribers and the alliance members hope that TWCERT/CC could offer more cybersecurity case studies sharing and educational training. This includes expanding influence through online courses, as well as hands-on drills and onsite advocacy, to help businesses better understand cyber attacks, their impact, and response strategies. They also emphasize the optimization of existing services, expressing an expectation for TWCERT/CC to continually enhance various services, making interfaces more user-friendly and efficient, and improving the speed of reporting and information updates.
Expected Content in the Future | Newsletter Subscribers | Taiwan CERT/CSIRT Alliance Members |
none | 430 | 118 |
Increase cyber security case information sharing, education and training | 55 | 13 |
Service items | 27 | 7 |
Positive encouragement | 27 | 6 |
Publicity Exposure Promotion/Industry Cooperation | 13 | 2 |
More information and content | 5 | 0 |
Services for SMEs | 4 | 0 |
Communication Channel/Notification Mechanism | 4 | 0 |
Others | 12 | 1 |
They share threat intelligence with enterprises. Generally speaking, I think the information they provide is relatively up-to-date, …The intelligence they provide, such as indicators of compromise (IOC), is very clear, which is pretty good.
We are more concerned about the attack method. …Since these are real cases of victimized enterprises, there should be a way to share the attack method after de-identification, …or perform some analysis or explanation about some active advanced persistent threat (APT) groups to inform Taiwanese enterprises about the key focus areas and directions to pay attention to.
The attacks can occur at night, so sometimes you may find 40 to 50, or even 80 reports when you get into the office, which is not very efficient if they all need to be dealt with manually. That's why the API was proposed, to screen the reports received, organize them, and communicate about that directly through the system.
Nowadays, threat intelligence is sent via email, it can be automated, right? Otherwise, I have to download the file, extract the Excel file or article manually, then find the URL and IP, and finally write a program to copy the information, every time. I hope to automate all these processes and the API could detect and process them in real-time.
Ask private enterprises to briefly explain the risks and problems they encounter, the attacks they have already witnessed, how the intrusions take place, using what methods, and their corresponding processes.
I hope that those workshops can be held both in southern and northern Taiwan. …There should be a balanced development between the north and the south. Some workshops are not suitable online, so I think a cybersecurity center is needed in the south to accommodate those in central and southern Taiwan.
I think that TWCERT or the Ministry of Digital Affairs have been conducting talent cultivation courses in recent years, offering some intermediate and advanced courses in both northern, central, and southern Taiwan. I think this is a good approach. The next step is to make sure that these courses can be made continuous and recurring to maintain their impact.