SlideShare ist ein Scribd-Unternehmen logo
1 von 11
charter-of-trust.com | #Charter of Trust
Charter of Trust
on Cybersecurity
Accountability Summit 2019 | No 06-07, 2019 in De Hague
Jacques Kruse Brandao, Global Head of Advocacy at SGS Digital Trust Services
Key global trends that are making
cyber security increasingly important
Rising political interest in cybersecurity, caused by increasing cyber risks
in an increasingly complex technological environmentGlobal level
Growing Cybersecurity
risk to businesses
Cyber incidents named
No. 2 global risk to
businesses in 2019
Fundamental tech-
nological changes
Technological disruptive
change such as IoT,
Artificial intelligence,
and ever-growing
connectivity
Resource shortage
increasing
Cybersecurity work-
force gap is widening –
and has increased to
3 million in 2019
“Policy is back”
Increasing cybersecurity
specific laws and
regulations worldwide,
e.g., Californian IoT law
published in 2019
Local vs. global
regulation
Regulation is stuck bet-
ween the urge for global
harmonization and indivi-
dual national approaches
and lags behind techno-
logical development
Increasing threat
landscape
Increasing capabilities
of state-sponsored
hacking, professionali-
zation of attacks and
AI applications
Digitalization is changing the world
It determines how we live, work, communicate and do business.
But the only way people can truly support digital transformation and
generate new potential for society is when they trust the technology.
That’s why, together with strong partners, we launched the Charter of Trust.
After two years, we can proudly say:
The collaborative approach works best.
With our ten principles, we have taken an important step toward
making the digital world more secure.
01 Ownership of cyber- and IT security
06 Education
02 Responsibility throughout the digital supply chain
07 Certification for critical infrastructure and solutions
03 Security by default
08 Transparency and response
04 User-centricity
09 Regulatory framework
05 Innovation and co-creation
10 Joint initiatives
The Charter of Trust combines
three strong dimensions and …
… offers proven approaches to secure the
digital world – by establishing, piloting and
implementing global requirements and concepts.
… aims at a global regulatory framework for
cybersecurity – by shaping the political debate
worldwide through foresight and reason.
… embeds cybersecurity in the digital transition
of industry – by successfully putting security
at the core of digital business models.
Technology
Politics
Business
TRUST
Through a holistic approach we can make the difference.
Every day we prove and reaffirm that in the following areas
We’re scaling Supply Chain Security.
After setting the baseline requirements for
our suppliers, we are now taking the next steps
by understanding the needs and driving the
implementation with respective tools and proven
approaches.
We’re convinced: Security by Default will
be a must-have across all our businesses.
That’s why we came up with a joint definition
and develop a first roll-out plan for use-cases,
applications and industries.
We’re driving Cybersecurity education
We believe people can be an organization’s best firewall.
So we commit to driving education in our organizations.
We’ve also launched activities for selected target groups –
from students, via SMEs, to education providers.
We’re shaping the harmonization of
regulation and standardization globally.
Thanks to our collective efforts, we are shaping
global political regulations on the national,
European and global levels.
And by doing so, we’re living up to our purpose
charter-of-trust.com
─ Effective cybersecurity is a precondition for
an open, fair and successful digital future.
─ By adhering to and promoting our principles,
we’re creating an instrumental foundation of trust for
all of us.
As a credible and reliable voice,
we collaborate with key stakeholders
to achieve trust in cybersecurity
for global citizens.
Together we strongly believe:
We sign for
cybersecurity!
We sign the
Charter of Trust.
.

Weitere ähnliche Inhalte

Was ist angesagt?

Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...SophiaPalmira
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkGwanhoo Lee
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhousesegughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010segughana
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)PanagiotisKeramidis
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebeccaBoston Global Forum
 

Was ist angesagt? (20)

Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
Introduction to AI Governance
Introduction to AI GovernanceIntroduction to AI Governance
Introduction to AI Governance
 
brochure
brochurebrochure
brochure
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 

Ähnlich wie I4ADA 2019 - Presentation Jacques Kruse Brandao

CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
The UK National Cyber Security Strategy
The UK National Cyber Security StrategyThe UK National Cyber Security Strategy
The UK National Cyber Security Strategy- Mark - Fullbright
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaperdigitalinasia
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 

Ähnlich wie I4ADA 2019 - Presentation Jacques Kruse Brandao (20)

CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
How Cyber Resilient are we?
How Cyber Resilient are we?How Cyber Resilient are we?
How Cyber Resilient are we?
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
The UK National Cyber Security Strategy
The UK National Cyber Security StrategyThe UK National Cyber Security Strategy
The UK National Cyber Security Strategy
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 

Mehr von Paul van Heel

I4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen BrownI4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen BrownPaul van Heel
 
I4ADA 2019 - Presentation Jeff Bullwinkel
I4ADA 2019  - Presentation Jeff BullwinkelI4ADA 2019  - Presentation Jeff Bullwinkel
I4ADA 2019 - Presentation Jeff BullwinkelPaul van Heel
 
I4ADA the hague summitCAHAI
I4ADA the hague summitCAHAII4ADA the hague summitCAHAI
I4ADA the hague summitCAHAIPaul van Heel
 
I4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkoshI4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkoshPaul van Heel
 
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...Paul van Heel
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungPaul van Heel
 

Mehr von Paul van Heel (6)

I4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen BrownI4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen Brown
 
I4ADA 2019 - Presentation Jeff Bullwinkel
I4ADA 2019  - Presentation Jeff BullwinkelI4ADA 2019  - Presentation Jeff Bullwinkel
I4ADA 2019 - Presentation Jeff Bullwinkel
 
I4ADA the hague summitCAHAI
I4ADA the hague summitCAHAII4ADA the hague summitCAHAI
I4ADA the hague summitCAHAI
 
I4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkoshI4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkosh
 
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge Chung
 

Kürzlich hochgeladen

AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Delhi Call girls
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 

Kürzlich hochgeladen (20)

AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 

I4ADA 2019 - Presentation Jacques Kruse Brandao

  • 1. charter-of-trust.com | #Charter of Trust Charter of Trust on Cybersecurity Accountability Summit 2019 | No 06-07, 2019 in De Hague Jacques Kruse Brandao, Global Head of Advocacy at SGS Digital Trust Services
  • 2. Key global trends that are making cyber security increasingly important Rising political interest in cybersecurity, caused by increasing cyber risks in an increasingly complex technological environmentGlobal level Growing Cybersecurity risk to businesses Cyber incidents named No. 2 global risk to businesses in 2019 Fundamental tech- nological changes Technological disruptive change such as IoT, Artificial intelligence, and ever-growing connectivity Resource shortage increasing Cybersecurity work- force gap is widening – and has increased to 3 million in 2019 “Policy is back” Increasing cybersecurity specific laws and regulations worldwide, e.g., Californian IoT law published in 2019 Local vs. global regulation Regulation is stuck bet- ween the urge for global harmonization and indivi- dual national approaches and lags behind techno- logical development Increasing threat landscape Increasing capabilities of state-sponsored hacking, professionali- zation of attacks and AI applications
  • 3. Digitalization is changing the world It determines how we live, work, communicate and do business. But the only way people can truly support digital transformation and generate new potential for society is when they trust the technology. That’s why, together with strong partners, we launched the Charter of Trust. After two years, we can proudly say: The collaborative approach works best.
  • 4. With our ten principles, we have taken an important step toward making the digital world more secure. 01 Ownership of cyber- and IT security 06 Education 02 Responsibility throughout the digital supply chain 07 Certification for critical infrastructure and solutions 03 Security by default 08 Transparency and response 04 User-centricity 09 Regulatory framework 05 Innovation and co-creation 10 Joint initiatives
  • 5. The Charter of Trust combines three strong dimensions and … … offers proven approaches to secure the digital world – by establishing, piloting and implementing global requirements and concepts. … aims at a global regulatory framework for cybersecurity – by shaping the political debate worldwide through foresight and reason. … embeds cybersecurity in the digital transition of industry – by successfully putting security at the core of digital business models. Technology Politics Business TRUST Through a holistic approach we can make the difference.
  • 6. Every day we prove and reaffirm that in the following areas We’re scaling Supply Chain Security. After setting the baseline requirements for our suppliers, we are now taking the next steps by understanding the needs and driving the implementation with respective tools and proven approaches.
  • 7. We’re convinced: Security by Default will be a must-have across all our businesses. That’s why we came up with a joint definition and develop a first roll-out plan for use-cases, applications and industries.
  • 8. We’re driving Cybersecurity education We believe people can be an organization’s best firewall. So we commit to driving education in our organizations. We’ve also launched activities for selected target groups – from students, via SMEs, to education providers.
  • 9. We’re shaping the harmonization of regulation and standardization globally. Thanks to our collective efforts, we are shaping global political regulations on the national, European and global levels.
  • 10. And by doing so, we’re living up to our purpose charter-of-trust.com ─ Effective cybersecurity is a precondition for an open, fair and successful digital future. ─ By adhering to and promoting our principles, we’re creating an instrumental foundation of trust for all of us. As a credible and reliable voice, we collaborate with key stakeholders to achieve trust in cybersecurity for global citizens. Together we strongly believe:
  • 11. We sign for cybersecurity! We sign the Charter of Trust. .

Hinweis der Redaktion

  1. Cybersecurity community: requirements, concepts – turn them into proven approaches (i.e. through piloting and implementating security approaches) Politics: shape the political debate worldwide by forethought and reason – establish a global regulatory framework (i.e., by first putting it on the agenda, then offering concrete ideas on regulation) Business: puts security at the core of digital business models – to embed Cybersecurity in the digital transition of the industry (i.e., show it´s opportunity and capacity to enable new / extend existing revenue and profit streams)
  2. Cybersecurity community: requirements, concepts – turn them into proven approaches (i.e. through piloting and implementating security approaches) Politics: shape the political debate worldwide by forethought and reason – establish a global regulatory framework (i.e., by first putting it on the agenda, then offering concrete ideas on regulation) Business: puts security at the core of digital business models – to embed Cybersecurity in the digital transition of the industry (i.e., show it´s opportunity and capacity to enable new / extend existing revenue and profit streams)
  3. - Five messages are designed along three dimensions – multiplying each other
  4. - Five messages are designed along three dimensions – multiplying each other
  5. - Five messages are designed along three dimensions – multiplying each other
  6. - Five messages are designed along three dimensions – multiplying each other