Global Cyber Alliance To Tackle The Biggest Risks

The Global Cyber Alliance (GCA) has been launched, holding its first strategic advisory committee (SAC) meeting recently at the New York Federal Reserve Bank.

The mission of GCA is to identify systemic cyber-risks where significant progress can be made on risk mitigation, and then to bring together the people and resources to identify and implement a solution—to take action—and to measure the effect. The outcome of this effort is not a report with recommendations but actual risk reduction moving forward on a path to eradicate a systemic cyber-risk.

The SAC is chaired by the GCA's three founding partners; the New York County District Attorney Cyrus R. Vance, Jr., London Police Commissioner Ian Dyson and Chair of the Center for Internet Security, John Gilligan.

GCA will regularly assess the top cyber-risks that the collective community believes are significant threats to the global, online community and for which GCA can have a measurable, positive impact on the eradication of the risk.

To that end, GCA has decided to tackle phishing by driving implementation of two solutions that have been shown to be effective—limiting spoofing of email (through DMARC) and minimizing the effect of phishing and other attacks (through secure DNS practices).

"The Global Cyber Alliance was borne out of a shared commitment to reducing cyber risk worldwide,” Vance said. “By focusing the institutional knowledge and resources of stakeholders on select challenges, GCA will be able to isolate and address key vulnerabilities adversely affecting individuals and organizations all over the world, ultimately benefitting those in both the public and private sectors."

At the Strategic Advisory Committee meeting, the Global Cyber Alliance presented several top systemic risks to consider tackling through task groups focused on implementation: Phishing; risks arising from weak identity and authentication mechanisms; risks arising from vulnerable and compromised websites; and distributed denial of service (DDoS) attacks.

"I have firsthand knowledge of the power of the collective effort to make systemic changes to improve our cybersecurity posture,” said Gilligan. “GCA’s mission is to confront these risks on an international scale which is critical in this day and age. The SAC meeting reconfirmed the importance of working together to confront these top risks."

Dyson added, "The Global Cyber Alliance has identified the biggest risks to businesses and individuals globally from cyber crime. By prioritizing the risks that cause the most harm, the alliance can build solutions that can make the cyber-world a safer place in the future."
Infosecurity: http://bit.ly/1pjNwDP

« Cybersecurity Training For US Undergraduates Is Dismal
Is Predictive Policing The Future? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

Hicomply

Hicomply

Hicomply simplifies compliance management with smart, user-friendly tools, helping you scale your processes and stay in control - no matter how complex.

Taktika

Taktika

Taktika stands at the forefront of cybersecurity defense, offering cutting-edge integration and managed Security Operations Center (SOC) services.