main main prints

The Charter of Trust is a non-profit alliance of leading global companies and organisations from various sectors, based on 10 principles, working together to make the digital world of tomorrow a safer place.

Activities

Strengthening cyber resilience

Key Initiatives in Security by Default, Supply Chain Security, Emerging Technologies, Education, and External Engagement
circles
Security by Default
Help integrate robust security measures into the core of every digital innovation and business operation.
circles
Supply Chain Security
Develop best practices on effectively ensuring the resilience of our respective supply chains against cyber threats.
circles
Emerging Technologies
Address and provide guidance to businesses on how to manage the complexities triggered by AI and Post Quantum Computing.
circles
Education
Raise awareness about cyber threats, promote best practices, and provide comprehensive training opportunities to individuals, students and organizations across the world.
circles
External Engagement
Foster public-private dialogue, prioritise greater alignment and reciprocity of cyber regulations internationally and advise regulators on practical implementation.
prints
News and publications

Latest updates

Important milestones towards more cybersecurity
Harmonising Regulation - a CoT perspective
icon External Engagement

Harmonising Regulation - a CoT perspective

In response to rising cyber threats, governments are enacting new cybersecurity laws and regulations, with some, like the United States (US), moving from voluntary public-private partnerships to more stringent regulatory approaches, while others, like the European Union (EU), are updating existing regulations (e.g. the Network and Information Security (NIS) Directive 2, or NIS 2) and creating new ones (e.g., Cyber Resilience Act, CRA). These efforts often set precedents for other nations, but the lack of international coordination in cybersecurity regulation remains a challenge. This fragmentation, coupled with shortages of cybersecurity talent, risks diverting resources from essential cyber defense to compliance, potentially increasing costs, complexity, and undermining resilience and innovation. Some solutions include reciprocity agreements, adopting international standards, and leveraging third-party assessments to streamline regulations and improve global alignment.

To read the full publication, see the download link below.
October 15, 2024
Charter of Trust Cybersecurity Policy Manifesto
icon External Engagement

Charter of Trust Cybersecurity Policy Manifesto

The Charter of Trust presents this Manifesto as a call to action for Policymakers to join forces in the pursuit of a secure and resilient digital environment. As a collective of leading technology, cybersecurity, and industry stakeholders, we believe that a united and collaborative approach is essential for effectively combating cyber threats that endanger the security, privacy, and prosperity of our societies.
Our vision is to establish a strong, secure, and resilient digital Europe that fosters innovation, economic growth, and social progress while protecting individual rights and safeguarding the values of a democratic society.
April 12, 2024
Webinar: Cyber Risk Assessment for surviving uncertain times: Guidelines and best practices from Charter of Trust experts
icon Security by Default

Webinar: Cyber Risk Assessment for surviving uncertain times: Guidelines and best practices from Charter of Trust experts

Join us to discuss with our experts the Charter of Trust's Guidelines on Cybersecurity Risk Assessment. They provide a concise introduction to risk assessment, supported by practical guidance based on the experience of its members.

The Charter of Trust consists of 10 Principles and this webinar is brought to you by the Charter’s Taskforce on Principle 3 “Security by Default”. Experts in this taskforce work to establish and adopt the highest appropriate level of security and data protection and ensure that it is preconfiguered into the design of products, functionalities, process, technologies, operations, architectures, and business models. We call this our Baseline Requirements: With them in mind, you can ensure confidentiality, authenticity, and integrity within your systems.

In this webinar, you will learn about the objectives, scope and benefits of risk assessment. Our experts Sudhir Ethiraj (TÜV SÜD), Angelika Steinacker (IBM), Marko Wolf (Bosch), Ki Hyun Park (Mitsubishi), and Didier Ludwig (Siemens) will share best practices with insights and examples on the roles, timing, methods, and standards involved in risk assessment.

We look forward to welcoming you at this virtual event.
March 21, 2024
-->-->