The digital world changes everything. Artificial intelligence and big data analytics are revolutionizing our decision makings; billions of devices are being connected by the Internet of Things and interacting on an entirely new level and scale.
We wish to protect the data and assets of individuals and businesses.Goal 1 of the Charter of Trust
We wish to prevent damage from people, businesses, and infrastructures.Goal 2 of the Charter of Trust
As much as these advancements are improving our lives and economies, the risk of exposure to malicious cyber attacks is also growing dramatically. Failure to protect the systems that control our homes, hospitals, factories, grids, and virtually all of our infrastructures could have devastating consequences. Democratic and economic values need to be protected against cyber and hybrid threats.
But no entity can take on this topic alone – regardless of how well set up we may be. The powers of politics, business and society must be pooled together – because cybersecurity concerns us all. To discuss the matter, we are using important worldwide forums. Together we will light the way and sign the Charter of Trust, showing how we can make the digital world more secure.
Together we wish to build a reliable basis for trust in a connected and digital world.Goal 3 of the Charter of Trust
Cybersecurity concerns all of usCybersecurity is and has to be more than a seatbelt or an airbag here; it's a factor that's crucial to the success of the digital economy. People and organizations need to trust that their digital technologies are safe and secure; otherwise they won't embrace the digital transformation. That's why we are signing together a Charter of Trust bearing the principles that are fundamental to a secure digital world.
Companies – and if necessary – governments must establish risk-based rules that ensure adequate protection across all IoT layers with clearly defined and mandatory requirements. Ensure confidentiality, authenticity, integrity, and availability by setting baseline standards, such as
- Identity and access management: Connected devices must have secure identities and safeguarding measures that only allow authorized users and devices to use them.
- Encryption: Connected devices must ensure confidentiality for data storage and transmission purposes, wherever appropriate.
- Continuous protection: Companies must offer updates, upgrades, and patches throughout a reasonable lifecycle for their products, systems, and services via a secure update mechanism.