Harmonising Regulation - a CoT perspective
icon External Engagement

Harmonising Regulation - a CoT perspective

In response to rising cyber threats, governments are enacting new cybersecurity laws and regulations, with some, like the United States (US), moving from voluntary public-private partnerships to more stringent regulatory approaches, while others, like the European Union (EU), are updating existing regulations (e.g. the Network and Information Security (NIS) Directive 2, or NIS 2) and creating new ones (e.g., Cyber Resilience Act, CRA). These efforts often set precedents for other nations, but the lack of international coordination in cybersecurity regulation remains a challenge. This fragmentation, coupled with shortages of cybersecurity talent, risks diverting resources from essential cyber defense to compliance, potentially increasing costs, complexity, and undermining resilience and innovation. Some solutions include reciprocity agreements, adopting international standards, and leveraging third-party assessments to streamline regulations and improve global alignment.

To read the full publication, see the download link below.
October 15, 2024
• 5 min read
Charter of Trust Cybersecurity Policy Manifesto
icon External Engagement

Charter of Trust Cybersecurity Policy Manifesto

The Charter of Trust presents this Manifesto as a call to action for Policymakers to join forces in the pursuit of a secure and resilient digital environment. As a collective of leading technology, cybersecurity, and industry stakeholders, we believe that a united and collaborative approach is essential for effectively combating cyber threats that endanger the security, privacy, and prosperity of our societies.
Our vision is to establish a strong, secure, and resilient digital Europe that fosters innovation, economic growth, and social progress while protecting individual rights and safeguarding the values of a democratic society.
April 12, 2024
• 5 min read
Charter of Trust report: Guideline on Cybersecurity Risk Assessment
icon Security by Default

Charter of Trust report: Guideline on Cybersecurity Risk Assessment

This document highlights the significance of caution and due diligence in relation to cyber risks when processes and value chains are supported by digital technology to improve efficiency. As digitalization progresses, such risks exist in products which are combined to systems and networks in the IT but also in the OT world. The intent of this document is to offers practical guidance to risk management based on the experience and expertise of the members of the Charter of Trust P3 Task Force.
February 15, 2024
• 4 min read
Charter of Trust – Secure Development Lifecycle: step-by-step guidelines
icon Security by Default

Charter of Trust – Secure Development Lifecycle: step-by-step guidelines

The purpose of this document is to provide additional information on a step-by-step approach for achieving secure development lifecycle, in addition to the Phase 1 and Phase 2 baseline requirements. The document aims to provide a deep dive into the topic of secure development lifecycle and define best practices for achieving the same. This includes the following steps: identifying the basic steps for a development lifecycle model and developing best practices for a secure development lifecycle.
February 15, 2023
• 5 min read
Principle Use Cases –  AES
icon External Engagement

Principle Use Cases – AES

How can companies increase the cybersecurity awareness of their employees? AES shares their take on implementing new and innovative training model that drives engagement.
January 03, 2023
• 4 min read
Principle Use Cases –  IBM
icon External Engagement

Principle Use Cases – IBM

How can companies ramp up their cybersecurity capacities and upgrade skills to provide a confident response to incidents? IBM shares their take on how they trained their customers to be proactive responders in a new Charter of Trust Principle Use Case.
December 13, 2022
• 4 min read
Principle Use Cases –  Mitsubishi
icon External Engagement

Principle Use Cases – Mitsubishi

How can companies cooperate to improve their supply chain security? Mitsubishi shares their take on developing a joint approach among partners to establish common cybersecurity awareness practices in a new Chater of Trust Principle Use Case.
December 06, 2022
• 5 min read
Principle Use Cases – Atos
icon External Engagement

Principle Use Cases – Atos

What are the main challenges and opportunities of Threat Intelligence sharing? Atos shares their take on bringing together experts from various partners and why this is a smart move.
November 22, 2022
• 3 min read
Principle Use Cases – Bosch
icon External Engagement

Principle Use Cases – Bosch

What approach can businesses take to resolving problems concerning Artificial Intelligence? Bosch details their experience based on the VCIO approach. Learn more in their Principle Use Case.
November 16, 2022
• 4 min read
Principle Use Cases – Allianz
icon External Engagement

Principle Use Cases – Allianz

How to keep employees aware of cyber risks and up-to-date with how to self-protect against cyber-attacks? Learn from Allianz as they share their best practices in a #UseCase under Charter Of Trust principle 6 "Education".
November 09, 2022
• 4 min read
Principle Use Cases - NXP
icon External Engagement

Principle Use Cases - NXP

Security risks with IoT devices are varied and diverse. On this, NXP shares their solution, in particular regarding the implementation of the high security standards for both critical suppliers and own products.
November 02, 2022
• 5 min read
Principle Use Cases - Siemens
icon External Engagement

Principle Use Cases - Siemens

Drawing from experience, Siemens shares its best practices and lessons learned concerning improving a cybersecurity posture.
October 25, 2022
• 4 min read