Skip to content
Cybersecurity Tech Accord

Cybersecurity Tech Accord

  • IoT Security
    • Overview
    • Facts & Figures
    • How to secure
    • For Manufacturers
    • Signatory Insights
    • What is IoT?
  • About
  • Our Commitment
  • Resources
    • Signatory Blogs
    • Our Commitment in Action
    • Webinars
    • Publications
    • Policy Submissions
    • Events
    • Cyber Hygiene
    • Vulnerability Disclosure Policies
  • Contact
  • Twitter
  • YouTube

Policy Submissions

Cybersecurity Tech Accord response to OEWG’s draft final report
March 2021March 10, 2021

Cybersecurity Tech Accord response to OEWG’s draft final report

Cybersecurity Tech Accord Response: Priority 2 Policy Recommendations for ICANN Board Consideration from EPDP Phase 2
February 2021February 12, 2021

Cybersecurity Tech Accord Response: Priority 2 Policy Recommendations for ICANN Board Consideration from EPDP Phase 2

Tech Accord reflections and comments on Geneva Dialogue background document
July 2020July 3, 2020

Tech Accord reflections and comments on Geneva Dialogue background document

Cybersecurity Tech Accord comments on OECD work on Digital Security
June 2020June 29, 2020

Cybersecurity Tech Accord comments on OECD work on Digital Security

Cybersecurity Tech Accord submission to Australian consultation on responsible state behavior in cyberspace
March 2020March 10, 2020

Cybersecurity Tech Accord submission to Australian consultation on responsible state behavior in cyberspace

Cybersecurity Tech Accord comments on OECD work on Responsible Management and Disclosure of Vulnerabilities
January 2020February 3, 2020

Cybersecurity Tech Accord comments on OECD work on Responsible Management and Disclosure of Vulnerabilities

Cybersecurity Tech Accord Letter to OECD Scoping Paper on Digital Security of Products
January 2020January 30, 2020

Cybersecurity Tech Accord Letter to OECD Scoping Paper on Digital Security of Products

A Joint Call to World Leaders for a Secure and Trusted Digital Economy
September 2019November 26, 2019

A Joint Call to World Leaders for a Secure and Trusted Digital Economy

International community needs restraint, collaboration and transparency to reduce risks of cyber conflict
September 2019December 6, 2019

International community needs restraint, collaboration and transparency to reduce risks of cyber conflict

The Cybersecurity Tech Accord response to a call for contributions from Best Practices Forum working group on ‘Cybersecurity Culture, Norms and Values’
September 2019November 26, 2019

The Cybersecurity Tech Accord response to a call for contributions from Best Practices Forum working group on ‘Cybersecurity Culture, Norms and Values’

Cybersecurity Tech Accord Signatories Endorse ETSI Technical Specification for IoT Security
March 2019November 26, 2019

Cybersecurity Tech Accord Signatories Endorse ETSI Technical Specification for IoT Security

The Cybersecurity Tech Accord welcomes the Global Commission’s Singapore Norm Package, offers comments on enhancing stability in cyberspace
February 2019November 25, 2019

The Cybersecurity Tech Accord welcomes the Global Commission’s Singapore Norm Package, offers comments on enhancing stability in cyberspace

January 2019March 5, 2019

Response to GCSC’s request for input on the ‘Norm Package Singapore’

December 2018March 5, 2019

Response to the UN High Level Panel on Digital Cooperation

UN High Level Panel on Digital Cooperation should ignore a multi-stakeholder approach to cybersecurity at its peril
December 2018November 25, 2019

UN High Level Panel on Digital Cooperation should ignore a multi-stakeholder approach to cybersecurity at its peril

Cybersecurity Tech Accord calls on ICANN to establish a mechanism for access to WHOIS data to effectively respond to cyberthreats
November 2018November 25, 2019

Cybersecurity Tech Accord calls on ICANN to establish a mechanism for access to WHOIS data to effectively respond to cyberthreats

The Cybersecurity Tech Accord endorses the Paris Call; strengthening our commitment to ensuring trust and stability in cyberspace
November 2018November 25, 2019

The Cybersecurity Tech Accord endorses the Paris Call; strengthening our commitment to ensuring trust and stability in cyberspace

September 2018March 5, 2019

Policy position on Vulnerability Equities Process (VEP)

The Cybersecurity Tech Accord supports the GFCE’s call for industry-wide adoption of transparent policies for coordinated vulnerability disclosure (CVD)
September 2018August 17, 2020

The Cybersecurity Tech Accord supports the GFCE’s call for industry-wide adoption of transparent policies for coordinated vulnerability disclosure (CVD)

August 2018March 5, 2019

Policy position on WHOIS

Cybersecurity Tech Accord urges ICANN to expedite solutions for WHOIS data
August 2018November 26, 2019

Cybersecurity Tech Accord urges ICANN to expedite solutions for WHOIS data

Signatories

  • 4 MFG
  • 10Pearls
  • ABB
  • Access Smart
  • Aims360
  • Alfred Tech
  • Aliter Technologies
  • Anomali
  • App Detex
  • Archive360
  • Arm
  • Atlassian
  • Atos
  • Aura
  • Avast
  • Avepoint
  • Balasys
  • Bankingly
  • Big Cloud Consultants
  • Billennium
  • Binary House
  • Bitdefender
  • BT
  • Capgemini
  • Carbon Black
  • Cisco
  • Cloudflare
  • Cloudreach
  • Cognizant
  • Com Laude
  • Contrast Security
  • Corestack
  • Cornerstore IT
  • Crayonic
  • CSC
  • Cyber Services
  • Cyber Trust Alliance
  • DataStax
  • Dell
  • DocuSign
  • Dogtown Media
  • Domain Tools
  • DXC
  • Eaton Corporation
  • EBRC
  • Entel
  • ePrivacy
  • ESET
  • Exeltek Consulting Group
  • eyeo
  • Facebook
  • Fastly
  • Fireeye
  • Flowmon Networks
  • Framework Security
  • F-Secure
  • G Data
  • Gigamon
  • Github
  • Gitlab
  • Globant
  • Greenlight
  • GreyCortex
  • GTD Group
  • Guardtime
  • HCS Business Solutions
  • Hitachi
  • Hmatix
  • HP Inc
  • HPE
  • Imperva
  • Indra
  • INFINIT Consulting
  • Integrity Partners
  • International Software Systems
  • Intuit
  • Juniper Networks
  • KoolSpan
  • KPN
  • LaSalle Consulting Partners
  • LawToolBox
  • Linkedin
  • Lirex
  • LOGRYTHM AFRICA LIMITED
  • Madison Computer Works
  • Mark Monitor
  • MediaPRO
  • Mercado Libre
  • Microsoft
  • Moback Inc
  • NEC
  • NetAPP
  • Nielsen
  • Nokia
  • Northwave
  • NTT
  • OnShore security
  • Oracle
  • Orange
  • Panasonic
  • Panda
  • Pax8
  • Percipient.ai
  • Predica
  • Professional Options
  • QOMPLX
  • Queue Associates
  • RedSeal
  • Resecurity
  • Reveal Data
  • Rockwell Automation
  • RSA
  • Safetica
  • Safe PC Cloud
  • Salesforce
  • SAP
  • Schneider Electric
  • Scitum
  • Secucloud
  • Securesoft
  • Security ScoreCard
  • Sharp
  • Silent Breach
  • Sonda
  • SSRD
  • Stackpath
  • Strata Information Technologies, Inc.
  • Stripe
  • Strong Connexions
  • Swisscom
  • Switchfast
  • Synack
  • TAD GROUP
  • Tanium
  • Telecom Italia
  • Telefonica
  • Telelink
  • Tenable
  • Threatmodeler Software Inc
  • Trend Micro
  • Unisys
  • US Licensing Group
  • US Medicalit
  • VALIDY NET INC
  • VMware
  • VU Security
  • Wallencore
  • wca technologies
  • WIPFLI
  • WISeKey