Global Cyber Security Awareness Month

 

While events such as the US Dept. Of Homeland Security's “National Cyber Security Month” have taken shape, grown and serve a purpose, their positive impact may fall short and be somewhat artificial because of the limited number of nations that annually mark the progress and challenge of cyber security in October’s month-long observances.

Cyber Security a Borderless Pursuit

First and foremost, it seems odd that we—as professionals—would be content to limit a month’s focus on cyber security to the level of nations. Cyber security is, by its very nature, a borderless pursuit. Should not events focusing on the importance of cyber security be equally borderless in scope? This is not a condemnation of ongoing national-level efforts; it is merely an acknowledgment that we can, and perhaps should, be more international in our thinking.

We have seen the technology industry do this before. The 2015 efforts of industry, when it partnered with UNICEF to address the protection of children in both the physical and cyber realms, are an excellent example of this. There have been other similar efforts, also international in scope, aimed at combatting such heinous activities as child exploitation and human trafficking in cyberspace. All of these are commendable and, quite frankly, our world is in need of more such actions.

Cyber security is an issue that affects everyone. From professionals working to secure the various facets of an increasingly digital economy and society, to those accessing email for the first time, or making their first purchases online, cyber security has become woven into the fabric of our digital world.

A Shared Responsibility

Reliable cyber security is the bedrock of our digital lives. It makes possible the free-flowing content we all make use of; provides us with a diverse spectrum of communication tools, platforms, and media; and ensures a trust-based environment within which commerce can be conducted. However, it remains up to us, as individuals, to cultivate cyber security as a shared responsibility, and up to national leaders throughout the world to support those efforts.

Over the past few years, international gatherings of leaders have resulted in tremendous strides in global cyber security, as norms have been agreed upon, and collaborative efforts created and implemented. Going forward, perhaps it would be of value to bring that progress even more intimately into the lives of the citizenry of our world.

Global Awareness, Education Critical

It would be a simple matter, as part of the work on this international norms and accords, to incorporate a commitment into the work: as each nation joins in a transnational cyber security agreement, part of that agreement contains a provision that the nations, governments, institutions… involved will either implement a Global Cyber Security Month or, if they are already marking this milestone month, to expand their efforts to bring attention to the need for educating, empowering and increasing the safety and security of our global digital society.

We all share in the responsibility to provide cyber security. Professionals do it through their work; ordinary citizens do it through right action, and making good choices when moving through our digital world and its economy. International leaders can support those efforts, and increase global knowledge about cyber security and its importance in our daily lives.

Information-Management

 

« Hacking The Vote: Russia Wins, America Loses
Cyber Threats To Israel’s Air Traffic Control »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.

eTech S.C.

eTech S.C.

eTech specialize in a broad range of technology solutions, including software development, cybersecurity, infrastructure, and IT outsourcing (ITO) services.