Global Cyber Security Awareness Month

 

While events such as the US Dept. Of Homeland Security's “National Cyber Security Month” have taken shape, grown and serve a purpose, their positive impact may fall short and be somewhat artificial because of the limited number of nations that annually mark the progress and challenge of cyber security in October’s month-long observances.

Cyber Security a Borderless Pursuit

First and foremost, it seems odd that we—as professionals—would be content to limit a month’s focus on cyber security to the level of nations. Cyber security is, by its very nature, a borderless pursuit. Should not events focusing on the importance of cyber security be equally borderless in scope? This is not a condemnation of ongoing national-level efforts; it is merely an acknowledgment that we can, and perhaps should, be more international in our thinking.

We have seen the technology industry do this before. The 2015 efforts of industry, when it partnered with UNICEF to address the protection of children in both the physical and cyber realms, are an excellent example of this. There have been other similar efforts, also international in scope, aimed at combatting such heinous activities as child exploitation and human trafficking in cyberspace. All of these are commendable and, quite frankly, our world is in need of more such actions.

Cyber security is an issue that affects everyone. From professionals working to secure the various facets of an increasingly digital economy and society, to those accessing email for the first time, or making their first purchases online, cyber security has become woven into the fabric of our digital world.

A Shared Responsibility

Reliable cyber security is the bedrock of our digital lives. It makes possible the free-flowing content we all make use of; provides us with a diverse spectrum of communication tools, platforms, and media; and ensures a trust-based environment within which commerce can be conducted. However, it remains up to us, as individuals, to cultivate cyber security as a shared responsibility, and up to national leaders throughout the world to support those efforts.

Over the past few years, international gatherings of leaders have resulted in tremendous strides in global cyber security, as norms have been agreed upon, and collaborative efforts created and implemented. Going forward, perhaps it would be of value to bring that progress even more intimately into the lives of the citizenry of our world.

Global Awareness, Education Critical

It would be a simple matter, as part of the work on this international norms and accords, to incorporate a commitment into the work: as each nation joins in a transnational cyber security agreement, part of that agreement contains a provision that the nations, governments, institutions… involved will either implement a Global Cyber Security Month or, if they are already marking this milestone month, to expand their efforts to bring attention to the need for educating, empowering and increasing the safety and security of our global digital society.

We all share in the responsibility to provide cyber security. Professionals do it through their work; ordinary citizens do it through right action, and making good choices when moving through our digital world and its economy. International leaders can support those efforts, and increase global knowledge about cyber security and its importance in our daily lives.

Information-Management

 

« Hacking The Vote: Russia Wins, America Loses
Cyber Threats To Israel’s Air Traffic Control »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

K&D Insurance Brokers

K&D Insurance Brokers

K&D provide insurance for all sectors of industry and commerce including cyber risk cover.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.