{"id":800,"date":"2012-08-30T10:17:32","date_gmt":"2012-08-30T07:17:32","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=800"},"modified":"2012-08-31T09:08:16","modified_gmt":"2012-08-31T06:08:16","slug":"cybersecurity-recommendations-to-governments-by-digitaleurope-jeita-and-iti","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=800","title":{"rendered":"Cybersecurity, recommendations for governments by DIGITALEUROPE, JEITA and ITI"},"content":{"rendered":"<p>Cybersecurity is clearly an issue for national security. 3 organizations have created a joined set of recommendations for governments.<\/p>\n<ul>\n<li>DIGITALEUROPE\n<ul>\n<li>represents the digital technology industry in Europe<\/li>\n<li><a href=\"http:\/\/www.digitaleurope.org\">http:\/\/www.digitaleurope.org<\/a><\/li>\n<\/ul>\n<\/li>\n<li>JEITA\n<ul>\n<li>Japan Electronics and Information Technology Industries Association<\/li>\n<li><a href=\"http:\/\/www.jeita.or.jp\/english\/\">http:\/\/www.jeita.or.jp\/english\/<\/a><\/li>\n<\/ul>\n<\/li>\n<li>ITI\n<ul>\n<li>Information Technology Industry Council<\/li>\n<li><a href=\"http:\/\/www.itic.org\">http:\/\/www.itic.org<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.digitaleurope.org\/Portals\/0\/Documents\/Trade%20Policy%20Group\/MEDIARELEASE.pdf\">Press release<\/a> and <a href=\"http:\/\/www.digitaleurope.org\/Portals\/0\/Documents\/Trade%20Policy%20Group\/DE%20ITI%20JEITA%20joint%20cybersecurity%20policy%20statement.pdf\">Recommendations<\/a> in June 2012.<\/p>\n<p>The recommendations are:<\/p>\n<ul>\n<li>Develop cyber security policies in a transparent manner and with relevant stakeholder input.<\/li>\n<li>Enable risk management and innovation.<\/li>\n<li>Develop and implement cyber security policies in partnership with the private sector.<\/li>\n<li>Encourage the development and use of globally recognized, industry-led, voluntary consensus<br \/>\nsecurity standards, best practices, assurance programs, and conformity assessment schemes.<\/li>\n<li>Ensure the use of globally standardised tests and certification.<\/li>\n<li>Ensure that cyber security requirements are technology-neutral.<\/li>\n<li>Ensure that cyber security requirements allow for procurement of technologies regardless of<br \/>\nthe country of origin or the nationality of the technology vendor.<\/li>\n<li>Ensure that any cyber security requirements avoid forced transfer or review of intellectual<br \/>\nproperty (IP), such as source code.<\/li>\n<li>Limit any prescriptive requirements to areas of the economy that are highly sensitive, such as<br \/>\ngovernment intelligence and military networks.<\/li>\n<li>Strengthen institutions, and develop contingency plans and cyber security strategies.<\/li>\n<li>Focus on criminals and their threats.<\/li>\n<li>Focus on education and awareness.<\/li>\n<\/ul>\n<p><strong>Notes<\/strong><\/p>\n<p>This is good news for information security industry, ie. to address cybersecurity with a mature approach. It encourages to use standards and best practises. The issue is difficult. But also there are tools and methods to address this. The solution is not only to create one security unit for this, but to involve stakeholders, which we have many, in the process. Information security professionals are needed to guide and educate stakeholders into a mature approach.<\/p>\n<p>Other links<\/p>\n<p>The information is also available at <a href=\"http:\/\/pr.euractiv.com\/press-release\/global-information-and-communications-technology-ict-industry-statement-24673\">EurActiv<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is clearly an issue for national security. 3 organizations have created a joined set of recommendations for governments. DIGITALEUROPE represents the digital technology industry in Europe http:\/\/www.digitaleurope.org JEITA Japan Electronics and Information Technology Industries Association http:\/\/www.jeita.or.jp\/english\/ ITI Information Technology &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=800\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[62,32],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/800"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=800"}],"version-history":[{"count":2,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/800\/revisions"}],"predecessor-version":[{"id":811,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/800\/revisions\/811"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}