Charter of Trust Webinar:
icon

Charter of Trust Webinar: "Cybersecurity risks along the digital supply chain - When and how to include them in your company’s risk management"

On September 14th, we hosted our latest webinar to discuss cybersecurity risks along the digital supply chain, especially when and how to include them in your company’s risk management.
January 21, 2026
Register now for the Webinar “How can Charter of Trust's global and cross-industry approach on security by default help increase security in your products, functionalities, and technologies?
icon

Register now for the Webinar “How can Charter of Trust's global and cross-industry approach on security by default help increase security in your products, functionalities, and technologies?"

14th October 2021
10:00-11:00 am CET
October 14, 2021
Register now for the Charter of Trust Roadshow at Atos’ event “Winning the cyber race”:  “Supply chain attacks: can we secure ecosystems?”
icon

Register now for the Charter of Trust Roadshow at Atos’ event “Winning the cyber race”: “Supply chain attacks: can we secure ecosystems?”

On Tuesday 5th October, 2:50 – 3:30 pm CEST, the Charter of Trust will host an online Roadshow as part of the event “Winning the cyber race – joining forces, joining the conversation” organised by Atos.
October 05, 2021
CoT Webinar: Cybersecurity risks along the digital supply chain - When and how to include them in your company’s risk management
icon

CoT Webinar: Cybersecurity risks along the digital supply chain - When and how to include them in your company’s risk management

Tuesday, 14th September 2021
5:00-6:00 p.m. CET
September 14, 2021
METI’s OSS security use cases reflect CoT Principles
icon

METI’s OSS security use cases reflect CoT Principles

Japan’s Ministry of Economy, Trade, and Industry (METI), an Associated Partner of the Charter of Trust, published a collection of use cases on open source software (OSS) security management that reflects the relevance of Charter of Trust Principles.
January 21, 2026
What is an AI-Powered SOC and why does it matter?
icon

What is an AI-Powered SOC and why does it matter?

By Vinod Vasudevan, Global CTO MDR & Deputy Global CTO – Cybersecurity Services, Atos
January 21, 2026
The State of the Ransomware Pandemic
icon

The State of the Ransomware Pandemic

By Zachary Thoreson, Cybersecurity Threat Intelligence Analyst, Global Cyber Security Team, AES
January 21, 2026
The thrill of cyber threat hunting with Kestrel Threat Hunting Language
icon

The thrill of cyber threat hunting with Kestrel Threat Hunting Language

By Julian Meyrick, Managing Partner & Vice President, Security Strategy Risk & Compliance, Security Transformation Services, IBM Security
January 21, 2026
The Charter of Trust gathers virtually for its 2nd Collaboration Week of the year
icon

The Charter of Trust gathers virtually for its 2nd Collaboration Week of the year

Between 14 and 24 June, representatives from Partner companies around the world gathered virtually for the Charter of Trust’s second Collaboration Week of the year. Principle Taskforces came together with the aim of further building up the strategic priorities of the Charter of Trust. The Charter of Trust also had the opportunity to welcome global cybersecurity experts, whose vibrant and insightful presentations fed into the overall discussion.
June 14, 2021
Is Cybersecurity an add-on feature?
icon

Is Cybersecurity an add-on feature?

By Sudhir Ethiraj, Global Head of Cybersecurity Office, TÜV SÜD and
Dr. Angelika Steinacker, CTO Identity & Access Management, IBM Security Services EMEA
January 21, 2026
Charter of Trust Webinar:
icon

Charter of Trust Webinar: "Responsibility throughout the digital supply chain beyond existing standards and norms: Are we doing enough?"

On June 2nd, we hosted our latest webinar to discuss how the Principle 2 Baseline Requirements link to existing standards and norms, and how you can get the most out of them. Watch the recording to revisit the full discussion between our experts.
January 21, 2026
Achieving Security by Default: An Explanatory Document for the Phase 1 “Products, Functionalities, Technologies” Baseline Requirements
icon

Achieving Security by Default: An Explanatory Document for the Phase 1 “Products, Functionalities, Technologies” Baseline Requirements

The objective of this Explanatory Document is to define the critical cybersecurity requirements needed to deliver secure products, processes, services and business models.
January 21, 2026
1 4 5 6 7 8 12