Achieving Security by Default for products, functionalities & technologies
icon Security by Default

Achieving Security by Default for products, functionalities & technologies

Baseline Requirements aimed at enabling security into the design of products, functionalities and technologies.
May 19, 2020
• 2 min read
Charter of Trust publishes recommendations for home office security
icon External Engagement

Charter of Trust publishes recommendations for home office security

The current COVID 19 crisis has led to an exponential increase in the numbers of WFH – people working from home – to safeguard public health. At the same time, there is an increased risk in terms of Cybersecurity.
March 20, 2020
• 5 min read
COVID 19 and how to securely work from home – key recommendations
icon Security by Default

COVID 19 and how to securely work from home – key recommendations

The current COVID 19 crisis has led to an exponential increase in the numbers of WFH – people working from home – to safeguard public health. At the same time, there is an increased risk in terms of Cybersecurity.
March 20, 2020
• 5 min read
Charter of Trust meets French Policy Makers
icon External Engagement

Charter of Trust meets French Policy Makers

On March 3rd, 2020, the Charter of Trust gathered its members to meet French cybersecurity policy makers in Paris. After a fruitful working lunch, members and guests joined the IBM X-Force Command Cyber Tactical Operations Center (C-TOC) simulation to experience and learn how to react to a real cybersecurity crisis.
March 17, 2020
• 5 min read
Common risk-based approach for the Digital Supply Chain
icon Supply Chain Security

Common risk-based approach for the Digital Supply Chain

Responsibility throughout the digital supply chain
Companies – and if necessary – governments must establish risk-based rules that ensure adequate protection across all IoT layers with clearly defined and mandatory requirements. Ensure confidentiality, authenticity, integrity, and availability by setting baseline standards, such as
– Identity and access management: Connected devices must have secure identities and safeguarding measures that only allow authorized users and devices to use them.
– Encryption: Connected devices must ensure confidentiality for data storage and transmission purposes, wherever appropriate.
– Continuous protection: Companies must offer updates, upgrades, and patches throughout a reasonable life cycle for their products, systems, and services via a secure update mechanism.

Based on this statement, the CoT members developed a common risk-based approach aligned with international norms to help improve cybersecurity and provide visibility through the supply chain. Three elements form this risk-based approach:
– Baseline requirements are common for all digital suppliers and define the fundamentals that a supplier must address in order to ensure the cybersecurity foundations for their product/service
– Supplier criticality Digital suppliers have different criticalities depending on risk factors, which are also dependent on the context viewed by the purchaser
– Verification Verification to the baseline requirements is dependent on the criticality of the supplier

The purpose of this document is to describe such a risk-based approach and its impact on the digital supply chain with a focus on the various stakeholders throughout the digital supply chain.
February 19, 2020
Charter of Trust partners decide on further measures for more cybersecurity
icon Security by Default

Charter of Trust partners decide on further measures for more cybersecurity

The Charter-of-Trust (CoT) partners have agreed to deliver next-generation products with preset cybersecurity, following a clear “Security by Default” philosophy.
February 14, 2020
• 5 min read
IBM releases its latest Threat Intelligence Index
icon Emerging Technologies

IBM releases its latest Threat Intelligence Index

The annual IBM X-Force® Threat Intelligence Index sheds light on the biggest cyber risks that organizations face today, with data and insights collected over the past year.
February 14, 2020
• 4 min read
Two years Charter of Trust
icon External Engagement

Two years Charter of Trust

On February 14, 2020, the Charter of Trust celebrates its second anniversary. Much has happened since February 2018 – in the context of the charter, but above all because of the charter itself.
February 01, 2020
• 3 min read
The Charter of Trust gathers for 4th Collaboration Week
icon External Engagement

The Charter of Trust gathers for 4th Collaboration Week

Being part of a global initiative sounds easy-breezy, right? It is a little more complicated than that. Think of the Charter of Trust as a global ‘community with hundreds of colleagues all around the globe – in different time zones and office environments.
January 27, 2020
• 4 min read
Seeing cybersecurity as an opportunity
icon External Engagement

Seeing cybersecurity as an opportunity

How to protect your business effectively: specific measures for small and medium-sized enterprises.

January 16, 2020
• 5 min read
Charter of Trust at the Internet Governance Forum 2019
icon Supply Chain Security

Charter of Trust at the Internet Governance Forum 2019

Representatives presented the latest developments and results of the Charter of Trust as part of a panel discussion on digital supply chain security at the Internet Governance Forum 2019 in Berlin, Germany.
November 29, 2019
• 5 min read
The Charter of Trust train stops in Graz and creates trust
icon External Engagement

The Charter of Trust train stops in Graz and creates trust

The first Associated Partner Forum of the Charter of Trust recently took place in the Austrian university city.
September 19, 2019
• 5 min read
1 9 10 11 12