Skip to content
Cybersecurity Tech Accord

Cybersecurity Tech Accord

  • IoT Security
    • Overview
    • Facts & Figures
    • How to secure
    • For Manufacturers
    • Signatory Insights
    • What is IoT?
  • About
  • Our Commitment
  • Resources
    • Signatory Blogs
    • Our Commitment in Action
    • Webinars
    • Publications
    • Policy Submissions
    • Events
    • Cyber Hygiene
    • Vulnerability Disclosure Policies
  • Contact
  • Twitter
  • YouTube

Author: agallo

Ambitious cybersecurity plans for the European Union (EU). Bolstering defenses and strengthening the Union’s voice internationally.
January 21, 2021January 21, 2021

Ambitious cybersecurity plans for the European Union (EU). Bolstering defenses and strengthening the Union’s voice internationally.

Disturbing trend: Recent nation state attacks
January 8, 2021January 12, 2021

Disturbing trend: Recent nation state attacks

Cybersecurity Tech Accord joins CyberPeace Foundation in the Global CyberPeace Challenge
October 29, 2020

Cybersecurity Tech Accord joins CyberPeace Foundation in the Global CyberPeace Challenge

WHOIS: The process grinds forward, sort of. No relief for cybersecurity pros is in sight.
September 24, 2020September 24, 2020

WHOIS: The process grinds forward, sort of. No relief for cybersecurity pros is in sight.

EVENT | Apps 4 Digital Peace Competition Virtual Awards Ceremony

EVENT | Apps 4 Digital Peace Competition Virtual Awards Ceremony

Cybersecurity Tech Accord launches “Stay Smart. Stay Safely Connected” to raise awareness on consumer IoT security
May 13, 2020May 13, 2020

Cybersecurity Tech Accord launches “Stay Smart. Stay Safely Connected” to raise awareness on consumer IoT security

Cybersecurity discussions at the United Nations: Let drafting begin!
April 2, 2020April 2, 2020

Cybersecurity discussions at the United Nations: Let drafting begin!

Cybersecurity Tech Accord Celebrates its Second Anniversary
February 25, 2020February 26, 2020

Cybersecurity Tech Accord Celebrates its Second Anniversary

How Microsoft Manages Its Own Insider Risk Using Artificial Intelligence & Machine Learning
February 21, 2020February 21, 2020

How Microsoft Manages Its Own Insider Risk Using Artificial Intelligence & Machine Learning

Apps 4 Digital Peace: Calling Young Innovators From Around The World
February 5, 2020February 5, 2020

Apps 4 Digital Peace: Calling Young Innovators From Around The World

Apps 4 Digital Peace: Frequently Asked Questions
February 5, 2020February 5, 2020

Apps 4 Digital Peace: Frequently Asked Questions

EVENT | Cybersecurity Tech Accord Annual Reception

EVENT | Cybersecurity Tech Accord Annual Reception

Addressing cybersecurity threats to critical infrastructure requires proactive action from government and industry
December 11, 2019December 11, 2019

Addressing cybersecurity threats to critical infrastructure requires proactive action from government and industry

SAVE THE DATE: New Cybersecurity Tech Accord Workshop with Civil Society

SAVE THE DATE: New Cybersecurity Tech Accord Workshop with Civil Society

CASE STUDY | VU Security

CASE STUDY | VU Security

New companies commit to Cybersecurity Tech Accord principles | In a new initiative signatories highlight how they “live” the principles day in and day out
October 23, 2019December 16, 2019

New companies commit to Cybersecurity Tech Accord principles | In a new initiative signatories highlight how they “live” the principles day in and day out

CASE STUDY | CSC

CASE STUDY | CSC

CASE STUDY | MarkMonitor

CASE STUDY | MarkMonitor

CASE STUDY | Microsoft

CASE STUDY | Microsoft

CASE STUDY | SSRD

CASE STUDY | SSRD

CASE STUDY | Trend Micro

CASE STUDY | Trend Micro

CASE STUDY | WISeKey

CASE STUDY | WISeKey

Cybersecurity Awareness Month: top-10 resources for individuals, business and governments
October 16, 2019October 23, 2019

Cybersecurity Awareness Month: top-10 resources for individuals, business and governments

Cybersecurity Awareness Month: New draft report on awareness programs in Commonwealth of Nations
October 9, 2019January 27, 2020

Cybersecurity Awareness Month: New draft report on awareness programs in Commonwealth of Nations

PANEL | The Importance of Vulnerability Handling. A discussion with the Cybersecurity Tech Accord

PANEL | The Importance of Vulnerability Handling. A discussion with the Cybersecurity Tech Accord

A Joint Call to World Leaders for a Secure and Trusted Digital Economy
September 11, 2019November 26, 2019

A Joint Call to World Leaders for a Secure and Trusted Digital Economy

The importance of vulnerability disclosure policies
August 9, 2019October 10, 2019

The importance of vulnerability disclosure policies

Leading by example. Cybersecurity Tech Accord welcomes new signatories and agrees to implement vulnerability disclosure policies across the group
July 25, 2019October 10, 2019

Leading by example. Cybersecurity Tech Accord welcomes new signatories and agrees to implement vulnerability disclosure policies across the group

In pursuit of partnership: Announcing a workshop series with civil society in 2019
July 10, 2019October 10, 2019

In pursuit of partnership: Announcing a workshop series with civil society in 2019

July 8, 2019October 10, 2019

VIDEO: Hear from some of our signatories on the cybersecurity concerns that keep them up at night

EVENT: Cybersecurity Tech Accord: Working with civil society – Join us tomorrow for a lively discussion

EVENT: Cybersecurity Tech Accord: Working with civil society – Join us tomorrow for a lively discussion

Reducing tensions in cyberspace by promoting cooperation. Cybersecurity Tech Accord publishes a set of recommendations on confidence-building measures in cyberspace.
April 4, 2019December 4, 2019

Reducing tensions in cyberspace by promoting cooperation. Cybersecurity Tech Accord publishes a set of recommendations on confidence-building measures in cyberspace.

NEW REPORT: 2018 IN REVIEW
March 5, 2019June 8, 2020

NEW REPORT: 2018 IN REVIEW

The Cybersecurity Tech Accord welcomes the Global Commission’s Singapore Norm Package, offers comments on enhancing stability in cyberspace
February 20, 2019November 25, 2019

The Cybersecurity Tech Accord welcomes the Global Commission’s Singapore Norm Package, offers comments on enhancing stability in cyberspace

Signatories

  • 4 MFG
  • 10Pearls
  • ABB
  • Access Smart
  • Aims360
  • Alfred Tech
  • Aliter Technologies
  • Anomali
  • App Detex
  • Archive360
  • Arm
  • Atlassian
  • Atos
  • Aura
  • Avast
  • Avepoint
  • Balasys
  • Bankigly
  • Big Cloud Consultants
  • Billennium
  • Binary House
  • Bitdefender
  • BT
  • Capgemini
  • Carbon Black
  • Cisco
  • Cloudflare
  • Cloudreach
  • Cognizant
  • Com Laude
  • Contrast Security
  • Corestack
  • Cornerstore IT
  • Crayonic
  • CSC
  • Cyber Services
  • Cyber Trust Alliance
  • DataStax
  • Dell
  • DocuSign
  • Dogtown Media
  • Domain Tools
  • DXC
  • Eaton Corporation
  • EBRC
  • Entel
  • ePrivacy
  • ESET
  • Exeltek Consulting Group
  • eyeo
  • Facebook
  • Fastly
  • Fireeye
  • Flowmon Networks
  • Framework Security
  • F-Secure
  • G Data
  • Gigamon
  • Github
  • Gitlab
  • Globant
  • Greenlight
  • GreyCortex
  • GTD Group
  • Guardtime
  • HCS Business Solutions
  • Hitachi
  • Hmatix
  • HP Inc
  • HPE
  • Imperva
  • Indra
  • INFINIT Consulting
  • Integrity Partners
  • International Software Systems
  • Intuit
  • Juniper Networks
  • KoolSpan
  • KPN
  • LaSalle Consulting Partners
  • LawToolBox
  • Linkedin
  • Lirex
  • LOGRYTHM AFRICA LIMITED
  • Madison Computer Works
  • Mark Monitor
  • MediaPRO
  • Mercado Libre
  • Microsoft
  • Moback Inc
  • NEC
  • NetAPP
  • Nielsen
  • Nokia
  • Northwave
  • NTT
  • OnShore security
  • Oracle
  • Orange
  • Panasonic
  • Panda
  • Pax8
  • Percipient.ai
  • Predica
  • Professional Options
  • QOMPLX
  • Queue Associates
  • RedSeal
  • Resecurity
  • Reveal Data
  • Rockwell Automation
  • RSA
  • Safetica
  • Safe PC Cloud
  • Salesforce
  • SAP
  • Schneider Electric
  • Scitum
  • Secucloud
  • Securesoft
  • Security ScoreCard
  • Sharp
  • Silent Breach
  • Sonda
  • SSRD
  • Stackpath
  • Strata Information Technologies, Inc.
  • Stripe
  • Strong Connexions
  • Swisscom
  • Switchfast
  • Synack
  • TAD GROUP
  • Tanium
  • Telecom Italia
  • Telefonica
  • Telelink
  • Tenable
  • Threatmodeler Software Inc
  • Trend Micro
  • Unisys
  • US Licensing Group
  • US Medicalit
  • VALIDY NET INC
  • VMware
  • VU Security
  • Wallencore
  • wca technologies
  • WIPFLI
  • WISeKey