Achieving Security by Default for processes, operations & architectures
icon Security by Default

Achieving Security by Default for processes, operations & architectures

17 Baseline Requirements aimed at enabling security into the design of processes, operations and architectures.
August 18, 2022
• 5 min read
CoT Education White Paper 2021: Transforming Human Behavior in Cybersecurity
icon Education

CoT Education White Paper 2021: Transforming Human Behavior in Cybersecurity

In its White Paper 2021, the Charter of Trust Principle 6 Education Taskforce shares practical advice on how to create a cybersafe culture based on the experience of CoT leaders. To this end, the paper outlines seven key recommendations for industry and government, which at the same time are a joint commitment of CoT Partners and Associated Partners.
October 12, 2024
• 5 min read
Achieving Security by Default: An Explanatory Document for the Phase 2 “Processes, Operations, Architectures” Baseline Requirements
icon Security by Default

Achieving Security by Default: An Explanatory Document for the Phase 2 “Processes, Operations, Architectures” Baseline Requirements

The objective of this Explanatory Document is to provide additional information on the Phase 2 “Processes, Operations, Architectures” Baseline Requirements.
December 07, 2021
• 2 min read
Achieving Security by Default: An Explanatory Document for the Phase 1 “Products, Functionalities, Technologies” Baseline Requirements
icon Security by Default

Achieving Security by Default: An Explanatory Document for the Phase 1 “Products, Functionalities, Technologies” Baseline Requirements

The objective of this Explanatory Document is to define the critical cybersecurity requirements needed to deliver secure products, processes, services and business models.
June 02, 2021
• 5 min read
Achieving Security by Default for products, functionalities & technologies
icon Security by Default

Achieving Security by Default for products, functionalities & technologies

Baseline Requirements aimed at enabling security into the design of products, functionalities and technologies.
May 19, 2020
• 2 min read
COVID 19 and how to securely work from home – key recommendations
icon External Engagement

COVID 19 and how to securely work from home – key recommendations

The current COVID 19 crisis has led to an exponential increase in the numbers of WFH – people working from home – to safeguard public health. At the same time, there is an increased risk in terms of Cybersecurity.
March 20, 2020
• 5 min read
Common risk-based approach for the Digital Supply Chain
icon Supply Chain Security

Common risk-based approach for the Digital Supply Chain

Companies – and if necessary – governments must establish risk-based rules that ensure adequate protection across all IoT layers with clearly defined and mandatory requirements.
February 19, 2020
• 5 min read
Seeing cybersecurity as an opportunity
icon External Engagement

Seeing cybersecurity as an opportunity

How to protect your business effectively: specific measures for small and medium-sized enterprises.

January 16, 2020
• 5 min read