SlideShare uma empresa Scribd logo
1 de 11
charter-of-trust.com | #Charter of Trust
Charter of Trust
on Cybersecurity
Accountability Summit 2019 | No 06-07, 2019 in De Hague
Jacques Kruse Brandao, Global Head of Advocacy at SGS Digital Trust Services
Key global trends that are making
cyber security increasingly important
Rising political interest in cybersecurity, caused by increasing cyber risks
in an increasingly complex technological environmentGlobal level
Growing Cybersecurity
risk to businesses
Cyber incidents named
No. 2 global risk to
businesses in 2019
Fundamental tech-
nological changes
Technological disruptive
change such as IoT,
Artificial intelligence,
and ever-growing
connectivity
Resource shortage
increasing
Cybersecurity work-
force gap is widening –
and has increased to
3 million in 2019
“Policy is back”
Increasing cybersecurity
specific laws and
regulations worldwide,
e.g., Californian IoT law
published in 2019
Local vs. global
regulation
Regulation is stuck bet-
ween the urge for global
harmonization and indivi-
dual national approaches
and lags behind techno-
logical development
Increasing threat
landscape
Increasing capabilities
of state-sponsored
hacking, professionali-
zation of attacks and
AI applications
Digitalization is changing the world
It determines how we live, work, communicate and do business.
But the only way people can truly support digital transformation and
generate new potential for society is when they trust the technology.
That’s why, together with strong partners, we launched the Charter of Trust.
After two years, we can proudly say:
The collaborative approach works best.
With our ten principles, we have taken an important step toward
making the digital world more secure.
01 Ownership of cyber- and IT security
06 Education
02 Responsibility throughout the digital supply chain
07 Certification for critical infrastructure and solutions
03 Security by default
08 Transparency and response
04 User-centricity
09 Regulatory framework
05 Innovation and co-creation
10 Joint initiatives
The Charter of Trust combines
three strong dimensions and …
… offers proven approaches to secure the
digital world – by establishing, piloting and
implementing global requirements and concepts.
… aims at a global regulatory framework for
cybersecurity – by shaping the political debate
worldwide through foresight and reason.
… embeds cybersecurity in the digital transition
of industry – by successfully putting security
at the core of digital business models.
Technology
Politics
Business
TRUST
Through a holistic approach we can make the difference.
Every day we prove and reaffirm that in the following areas
We’re scaling Supply Chain Security.
After setting the baseline requirements for
our suppliers, we are now taking the next steps
by understanding the needs and driving the
implementation with respective tools and proven
approaches.
We’re convinced: Security by Default will
be a must-have across all our businesses.
That’s why we came up with a joint definition
and develop a first roll-out plan for use-cases,
applications and industries.
We’re driving Cybersecurity education
We believe people can be an organization’s best firewall.
So we commit to driving education in our organizations.
We’ve also launched activities for selected target groups –
from students, via SMEs, to education providers.
We’re shaping the harmonization of
regulation and standardization globally.
Thanks to our collective efforts, we are shaping
global political regulations on the national,
European and global levels.
And by doing so, we’re living up to our purpose
charter-of-trust.com
─ Effective cybersecurity is a precondition for
an open, fair and successful digital future.
─ By adhering to and promoting our principles,
we’re creating an instrumental foundation of trust for
all of us.
As a credible and reliable voice,
we collaborate with key stakeholders
to achieve trust in cybersecurity
for global citizens.
Together we strongly believe:
We sign for
cybersecurity!
We sign the
Charter of Trust.
.

Mais conteúdo relacionado

Mais procurados

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
segughana
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010
segughana
 
Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)
PanagiotisKeramidis
 

Mais procurados (20)

Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
Introduction to AI Governance
Introduction to AI GovernanceIntroduction to AI Governance
Introduction to AI Governance
 
brochure
brochurebrochure
brochure
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 

Semelhante a I4ADA 2019 - Presentation Jacques Kruse Brandao

CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
RobertPike
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
Charmaine Servado
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
Vasuki Kashyap
 

Semelhante a I4ADA 2019 - Presentation Jacques Kruse Brandao (20)

CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
How Cyber Resilient are we?
How Cyber Resilient are we?How Cyber Resilient are we?
How Cyber Resilient are we?
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
The UK National Cyber Security Strategy
The UK National Cyber Security StrategyThe UK National Cyber Security Strategy
The UK National Cyber Security Strategy
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 

Mais de Paul van Heel

Mais de Paul van Heel (6)

I4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen BrownI4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen Brown
 
I4ADA 2019 - Presentation Jeff Bullwinkel
I4ADA 2019  - Presentation Jeff BullwinkelI4ADA 2019  - Presentation Jeff Bullwinkel
I4ADA 2019 - Presentation Jeff Bullwinkel
 
I4ADA the hague summitCAHAI
I4ADA the hague summitCAHAII4ADA the hague summitCAHAI
I4ADA the hague summitCAHAI
 
I4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkoshI4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkosh
 
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge Chung
 

Último

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 

Último (18)

Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 

I4ADA 2019 - Presentation Jacques Kruse Brandao

  • 1. charter-of-trust.com | #Charter of Trust Charter of Trust on Cybersecurity Accountability Summit 2019 | No 06-07, 2019 in De Hague Jacques Kruse Brandao, Global Head of Advocacy at SGS Digital Trust Services
  • 2. Key global trends that are making cyber security increasingly important Rising political interest in cybersecurity, caused by increasing cyber risks in an increasingly complex technological environmentGlobal level Growing Cybersecurity risk to businesses Cyber incidents named No. 2 global risk to businesses in 2019 Fundamental tech- nological changes Technological disruptive change such as IoT, Artificial intelligence, and ever-growing connectivity Resource shortage increasing Cybersecurity work- force gap is widening – and has increased to 3 million in 2019 “Policy is back” Increasing cybersecurity specific laws and regulations worldwide, e.g., Californian IoT law published in 2019 Local vs. global regulation Regulation is stuck bet- ween the urge for global harmonization and indivi- dual national approaches and lags behind techno- logical development Increasing threat landscape Increasing capabilities of state-sponsored hacking, professionali- zation of attacks and AI applications
  • 3. Digitalization is changing the world It determines how we live, work, communicate and do business. But the only way people can truly support digital transformation and generate new potential for society is when they trust the technology. That’s why, together with strong partners, we launched the Charter of Trust. After two years, we can proudly say: The collaborative approach works best.
  • 4. With our ten principles, we have taken an important step toward making the digital world more secure. 01 Ownership of cyber- and IT security 06 Education 02 Responsibility throughout the digital supply chain 07 Certification for critical infrastructure and solutions 03 Security by default 08 Transparency and response 04 User-centricity 09 Regulatory framework 05 Innovation and co-creation 10 Joint initiatives
  • 5. The Charter of Trust combines three strong dimensions and … … offers proven approaches to secure the digital world – by establishing, piloting and implementing global requirements and concepts. … aims at a global regulatory framework for cybersecurity – by shaping the political debate worldwide through foresight and reason. … embeds cybersecurity in the digital transition of industry – by successfully putting security at the core of digital business models. Technology Politics Business TRUST Through a holistic approach we can make the difference.
  • 6. Every day we prove and reaffirm that in the following areas We’re scaling Supply Chain Security. After setting the baseline requirements for our suppliers, we are now taking the next steps by understanding the needs and driving the implementation with respective tools and proven approaches.
  • 7. We’re convinced: Security by Default will be a must-have across all our businesses. That’s why we came up with a joint definition and develop a first roll-out plan for use-cases, applications and industries.
  • 8. We’re driving Cybersecurity education We believe people can be an organization’s best firewall. So we commit to driving education in our organizations. We’ve also launched activities for selected target groups – from students, via SMEs, to education providers.
  • 9. We’re shaping the harmonization of regulation and standardization globally. Thanks to our collective efforts, we are shaping global political regulations on the national, European and global levels.
  • 10. And by doing so, we’re living up to our purpose charter-of-trust.com ─ Effective cybersecurity is a precondition for an open, fair and successful digital future. ─ By adhering to and promoting our principles, we’re creating an instrumental foundation of trust for all of us. As a credible and reliable voice, we collaborate with key stakeholders to achieve trust in cybersecurity for global citizens. Together we strongly believe:
  • 11. We sign for cybersecurity! We sign the Charter of Trust. .

Notas do Editor

  1. Cybersecurity community: requirements, concepts – turn them into proven approaches (i.e. through piloting and implementating security approaches) Politics: shape the political debate worldwide by forethought and reason – establish a global regulatory framework (i.e., by first putting it on the agenda, then offering concrete ideas on regulation) Business: puts security at the core of digital business models – to embed Cybersecurity in the digital transition of the industry (i.e., show it´s opportunity and capacity to enable new / extend existing revenue and profit streams)
  2. Cybersecurity community: requirements, concepts – turn them into proven approaches (i.e. through piloting and implementating security approaches) Politics: shape the political debate worldwide by forethought and reason – establish a global regulatory framework (i.e., by first putting it on the agenda, then offering concrete ideas on regulation) Business: puts security at the core of digital business models – to embed Cybersecurity in the digital transition of the industry (i.e., show it´s opportunity and capacity to enable new / extend existing revenue and profit streams)
  3. - Five messages are designed along three dimensions – multiplying each other
  4. - Five messages are designed along three dimensions – multiplying each other
  5. - Five messages are designed along three dimensions – multiplying each other
  6. - Five messages are designed along three dimensions – multiplying each other