On June 2nd, we hosted our latest webinar to discuss how the Principle 2 Baseline Requirements link to existing standards and norms, and how you can get the most out of them. Watch the recording to revisit the full discussion between our experts.

The Charter of Trust experts in this webinar:

  • David Badanes, Director, Technology and Services Group, AES Corporation
  • Christophe Bouly, Security Manager for Secure Development, NXP Semiconductors
  • Sudhir Ethiraj, Global Head of Cybersecurity Office (CSO), TÜV SÜD
  • Anne Leslie, Senior Managing Consultant for Threat Management (SIOC), IBM Security
  • Thomas Mosel, Principal Product & Solution Security Officer, Siemens Smart Infrastructure
  • Jonathan Sage, Government and Regulatory Affairs Executive, IBM

You may also like

Charter of Trust report: Guideline on Cybersecurity Risk Assessment
icon

Charter of Trust report: Guideline on Cybersecurity Risk Assessment

This document highlights the significance of caution and due diligence in relation to cyber risks when processes and value chains are supported by digital technology to improve efficiency. As digitalization progresses, such risks exist in products which are combined to systems and networks in the IT but also in the OT world. The intent of this document is to offers practical guidance to risk management based on the experience and expertise of the members of the Charter of Trust P3 Task Force.
October 09, 2024
5 min read
Charter of Trust Webinar:
icon

Charter of Trust Webinar: "How can you protect your business using the SDLC approach in the dynamic regulatory environment and threat landscape?"

On October 19th 2023, we hosted our latest webinar to discuss how Charter of Trust's approach helps improving cybersecurity by establishing a culture of security by default in businesses’ production chain and using a Secure Development Lifecycle approach.
October 09, 2024
5 min read
Charter of Trust – Secure Development Lifecycle: step-by-step guidelines
icon

Charter of Trust – Secure Development Lifecycle: step-by-step guidelines

The purpose of this document is to provide additional information on a step-by-step approach for achieving secure development lifecycle, in addition to the Phase 1 and Phase 2 baseline requirements. The document aims to provide a deep dive into the topic of secure development lifecycle and define best practices for achieving the same. This includes the following steps: identifying the basic steps for a development lifecycle model and developing best practices for a secure development lifecycle.
October 09, 2024
5 min read