“Security by Default in view of major EU Cybersecurity Regulations”
icon Security by Default

“Security by Default in view of major EU Cybersecurity Regulations”

On the 29th of October our P3 Security by Default Working Group has hosted its insightful webinar, in which they dived deep into the latest developments surrounding “Security by Default in view of major EU Cybersecurity Regulations”.

🔒 Here the main points of discussion:

- Key insights into what NIS2, the European Cyber Resilience Act and other regulations mean for businesses
- Best practices for adapting to relevant regulations
- Expert strategies on how to deal with regulatory challenges
- Live Q&A with industry experts


Here the esteemed panelists

Sudhir Ethiraj, Global Head of Cybersecurity Office, TÜV SÜD (Moderator)
Dr. Angelika Steinacker, CTO IAM, Cybersecurity Services, IBM
Marko Wolf, Chief Expert Product Cybersecurity Governance, Bosch
Joe Lomako, Cybersecurity Lab Manager, TÜV SÜD
Didier Ludwig, Cybersecurity Officer, Siemens
Francesca Bosco, Chief Strategy and Partnerships Officer, CyberPeace Institute

Please find the recording of the webinar below. Follow us on LinkedIn to find out, when the next webinar is going to happen: https://www.linkedin.com/company/charter-of-trust
October 29, 2024
• 3 min read
Webinar: Cyber Risk Assessment for surviving uncertain times: Guidelines and best practices from Charter of Trust experts
icon Security by Default

Webinar: Cyber Risk Assessment for surviving uncertain times: Guidelines and best practices from Charter of Trust experts

Join us to discuss with our experts the Charter of Trust's Guidelines on Cybersecurity Risk Assessment. They provide a concise introduction to risk assessment, supported by practical guidance based on the experience of its members.

The Charter of Trust consists of 10 Principles and this webinar is brought to you by the Charter’s Taskforce on Principle 3 “Security by Default”. Experts in this taskforce work to establish and adopt the highest appropriate level of security and data protection and ensure that it is preconfiguered into the design of products, functionalities, process, technologies, operations, architectures, and business models. We call this our Baseline Requirements: With them in mind, you can ensure confidentiality, authenticity, and integrity within your systems.

In this webinar, you will learn about the objectives, scope and benefits of risk assessment. Our experts Sudhir Ethiraj (TÜV SÜD), Angelika Steinacker (IBM), Marko Wolf (Bosch), Ki Hyun Park (Mitsubishi), and Didier Ludwig (Siemens) will share best practices with insights and examples on the roles, timing, methods, and standards involved in risk assessment.

We look forward to welcoming you at this virtual event.
March 21, 2024
• 5 min read
Principle of
icon Security by Default

Principle of "Security by Default"

Want to learn more the principle of "Security by Default"?

👉 Read the full interview with Sudhir Ethiraj, Global Head of Cybersecurity Office Hashtag#TÜVSÜD and Taskforce Lead, Security by Default Hashtag#CharterofTrust: http://spkl.io/60444ahb0

3 key takeaways:
💡 Charter of Trust introduced the principle “Security by default” recognizing that securing the product alone is not sufficient.
💡 The biggest challenge: Outdated devices and existing systems are still functional and have significant financial investments associated with them. However, they were not designed with security in mind.
💡 The Charter of Trust taskforce worked on establishing a common set of guidelines for Security by default that can be used across different industries and domains.

Thank you Siemens for including this topic in your Cybersecurity and Charter of Trust Hashtag#Innovation series. Looking forward to the further exchange this week with Hashtag#MSC2024 ahead.
February 15, 2024
• 3 min read
Charter of Trust report: Guideline on Cybersecurity Risk Assessment
icon Security by Default

Charter of Trust report: Guideline on Cybersecurity Risk Assessment

This document highlights the significance of caution and due diligence in relation to cyber risks when processes and value chains are supported by digital technology to improve efficiency. As digitalization progresses, such risks exist in products which are combined to systems and networks in the IT but also in the OT world. The intent of this document is to offers practical guidance to risk management based on the experience and expertise of the members of the Charter of Trust P3 Task Force.
February 15, 2024
• 4 min read
Webinar: Protect your business using the Secure Development Lifecycle approach
icon Security by Default

Webinar: Protect your business using the Secure Development Lifecycle approach

The Charter of Trust’s Principle 3 Taskforce is pleased to invite you to a webinar on Thursday, 19th October 2023 14:00-15:00 CEST

How the can you protect your business using the Secure Development Lifecycle approach in a dynamic regulatory environment and threat landscape?

Join us and discuss with our experts how the Charter of Trust's step-by-step guidelines for the Secure Development Lifecycle can assist you in enhancing cybersecurity through in Security by Default and Security by Design strategies.

The Charter of Trust consists of 10 Principles and this webinar is brought to you by the Charter’s Taskforce on Principle 3 “Security by Default”. Experts in this taskforce work to establish and adopt the highest appropriate level of security and data protection and ensure that it is preconfiguered into the design of products, functionalities, process, technologies, operations, architectures, and business models. We call this our Baseline Requirements: With them in mind, you can ensure confidentiality, authenticity, and integrity within your systems.

In this webinar, you can learn how to bridge the two sets of baseline requirements, first for products, functionalities, and technologies, second for processes, operations, and architecture. It shows you step-by-step how a product or service can be designed integrating baseline security mechanisms. To make this knowledge highly actionable for you, experts from TÜV SÜD, IBM, Atos and our guest from the Cloud Security Alliance will share best practices with insights and examples.
October 19, 2023
• 5 min read
Charter of Trust – Secure Development Lifecycle: step-by-step guidelines
icon Security by Default

Charter of Trust – Secure Development Lifecycle: step-by-step guidelines

The purpose of this document is to provide additional information on a step-by-step approach for achieving secure development lifecycle, in addition to the Phase 1 and Phase 2 baseline requirements. The document aims to provide a deep dive into the topic of secure development lifecycle and define best practices for achieving the same. This includes the following steps: identifying the basic steps for a development lifecycle model and developing best practices for a secure development lifecycle.
February 15, 2023
• 5 min read
Charter of Trust – Secure Development Lifecycle: step-by-step guidelines
icon Security by Default

Charter of Trust – Secure Development Lifecycle: step-by-step guidelines

As 2023 marks the fifth anniversary of the Charter of Trust, we are publishing a “Secure Development Lifecycle: step-by-by step guidelines", our latest guiding document in line with the Charter's Principle 3, Security By Default.
February 15, 2023
• 5 min read
Security By Default for Cloud Environments
icon Security by Default

Security By Default for Cloud Environments

"Security By Default for Cloud Environments" is the key topic that high-level speakers from IBM, Allianz, TÜV SÜD and Atos discussed during the Principle 3 “Security by Default” taskforce’s webinar, on 18 October 2022.
October 19, 2022
• 5 min read
Cloud threat landscape report highlights trends in cloud security
icon Security by Default

Cloud threat landscape report highlights trends in cloud security

By John Collins, Security Marketing Leader, IBM
October 07, 2022
• 5 min read
Achieving Security by Default for processes, operations & architectures
icon Security by Default

Achieving Security by Default for processes, operations & architectures

17 Baseline Requirements aimed at enabling security into the design of processes, operations and architectures.
August 18, 2022
• 5 min read
The Charter of Trust reflects on the US Cybersecurity Executive Order at the occasion of its first  anniversary
icon Security by Default

The Charter of Trust reflects on the US Cybersecurity Executive Order at the occasion of its first anniversary

A little over a year ago, President Joe Biden signed Executive Order 14028 on “Improving the Nation's Cybersecurity”, thereby making a significant commitment to address persistent and growing cyber threat. One year on, the Charter of Trust reflects on the improvements, challenges and possible ways forward.
May 25, 2022
• 5 min read
Identity and access management as a crucial factor for security-by-default
icon Security by Default

Identity and access management as a crucial factor for security-by-default

“Why is identity and access management key to ensure the security of the default configuration settings of assets?" This is the issue that high-level speakers from IBM, NXP, TÜV SÜD and ATOS discussed during the Principle 3 “Security by Default” taskforce’s webinar, on 16 February 2022.
February 21, 2022
• 5 min read