Charter of Trust

Charter of Trust

For a secure digital world. Cybersecurity is becoming the most important security topic of the future – particularly in the age of digitalization.  
Our motivations

Creating trust in a secure digital world

People and organizations need to trust that their digital technologies are safe and secure; otherwise they won’t embrace the digital transformation. Digitalization and cybersecurity must evolve hand in hand.
We wish to prevent damage from people, businesses, and infrastructures.
Goal 2 of the Charter of Trust

As much as these advancements are improving our lives and economies, the risk of exposure to malicious cyber attacks is also growing dramatically. Failure to protect the systems that control our homes, hospitals, factories, grids, and virtually all of our infrastructures could have devastating consequences. Democratic and economic values need to be protected against cyber and hybrid threats.

But no entity can take on this topic alone – regardless of how well set up we may be. The powers of politics, business and society must be pooled together – because cybersecurity concerns us all. To discuss the matter, we are using important worldwide forums. Together we will light the way and sign the Charter of Trust, showing how we can make the digital world more secure.

Together we wish to build a reliable basis for trust in a connected and digital world.
Goal 3 of the Charter of Trust
Our answer: the Charter of Trust

Cybersecurity concerns all of us

Cybersecurity is and has to be more than a seatbelt or an airbag here; it's a factor that's crucial to the success of the digital economy. People and organizations need to trust that their digital technologies are safe and secure; otherwise they won't embrace the digital transformation. That's why we are signing together a Charter of Trust bearing the principles that are fundamental to a secure digital world.

Anchor the responsibility for cybersecurity at the highest governmental and business levels by designating specific ministries and CISOs. Establish clear measures and targets as well as the right mindset throughout organizations – “It is everyone’s task”.

Companies – and if necessary – governments must establish risk-based rules that ensure adequate protection across all IoT layers with clearly defined and mandatory requirements. Ensure confidentiality, authenticity, integrity, and availability by setting baseline standards, such as

  • Identity and access management: Connected devices must have secure identities and safeguarding measures that only allow authorized users and devices to use them.
  • Encryption: Connected devices must ensure confidentiality for data storage and transmission purposes, wherever appropriate.
  • Continuous protection: Companies must offer updates, upgrades, and patches throughout a reasonable lifecycle for their products, systems, and services via a secure update mechanism.

Adopt the highest appropriate level of security and data protection and ensure that it is preconfigured into the design of products, functionalities, processes, technologies, operations, architectures, and business models.

Serve as a trusted partner throughout a reasonable lifecycle, providing products, systems, and services as well as guidance based on the customer’s cybersecurity needs, impacts, and risks.

Combine domain know-how and deepen a joint understanding between firms and policymakers of cybersecurity requirements and rules in order to continuously innovate and adapt cybersecurity measures to new threats; drive and encourage i.a. contractual Public Private Partnerships.

Include dedicated cybersecurity courses in school curricula – as degree courses in universities, professional education, and trainings – in order to lead the transformation of skills and job profiles needed for the future.

Companies – and if necessary – governments establish mandatory independent third-party certifications (based on future-proof definitions, where life and limb is at risk in particular) for critical infrastructure as well as critical IoT solutions.

Participate in an industrial cybersecurity network in order to share new insights, information on incidents et al.; report incidents beyond today’s practice which is focusing on critical infrastucture.

Promote multilateral collaborations in regulation and standardization to set a level playing field matching the global reach of WTO; inclusion of rules for cybersecurity into Free Trade Agreements (FTAs).

Drive joint initiatives including all relevant stakeholders in order to implement the above principles in the various parts of the digital world without undue delay.

Our PoF feature on Cybersecurity

Working together to strengthen Cybersecurity

Digital connectivity is making our lives easier and boosting business competitiveness. However, the risk of cyber attacks is increasing as well, causing governments and companies to join forces in defense.

Working together to strengthen Cybersecurity
Find out more in our innovation magazine Pictures of the Future

PoF feature on Cybersecurity