Neither US, Russia Or China Will Sign Macron's Cyber Pact

The US, Russia and China, three of today's major cyber-powers, have not signed an agreement on rules and principles released today at the Paris Peace Forum by President Emmanuel Macron of France.
 
The pact was signed by 51 countries, the 72 companies part of The Cybersecurity Tech, the 16 companies part of The Charter of Tech,  plus 136 other private companies, and 92 non-profit organisation, universities, and advocacy groups.
 
Major American technology corporations including Microsoft, Facebook, Google, IBM, and HP all endorsed the agreement. 
The Paris Call for Trust and Security in Cyberspace, as the agreement has been named, is the most coordinated effort to date to get countries to agree on a set of international rules for cyberspace, a so-called Digital Geneva Convention.
 
Microsoft's Chief Legal Officer Brad Smith has been advocating for such a pact since 2017 after the executive had seen the damage done to the private sector by the NotPetya outbreak, which was later proved to the work of Russian state cyber-operatives attempting to wreak havoc Ukraine.
 
Besides the US, China, and Russia, other countries with important and cyber units that didn't sign the pact include Iran, Israel, and North Korea.
 
Without the signatures of these "heavy hitters," the pact is useless, albeit many suspect it was only a PR stunt. The pact was signed a day after world leaders celebrated 100 years since the end of World War I.
 
The pact doesn't include any penalties for those who signed, yet have broken the agreement's clauses. The document is more of a charter and declaration of intent to sign a future, more comprehensive agreement.
 
The Paris Call for Trust and Security in Cyberspace proposes the following measures and steps:
 
• Prevent and recover from malicious cyber activities that threaten or cause significant, indiscriminate or systemic harm to individuals and critical infrastructure;
• Prevent activity that intentionally and substantially damages the general availability or of the public core of the Internet;
• Strengthen our capacity to prevent malign interference by foreign actors aimed at undermining electoral processes through malicious cyber activities;
• Prevent ICT-enabled theft of intellectual property, including trade secrets or other confidential information, with the intent of providing competitive advantages to companies or sector;
• Develop ways to prevent the proliferation of malicious ICT and practices intended to cause harm;
• Strengthen the security of digital processes, products and, throughout their lifecycle and supply chain;
• Support efforts to strengthen an advanced cyber hygiene for all actors;
• Take steps to prevent non-State actors, including the private sector, from hacking-back, for their own purposes or those of other non-State actors;
• Promote the widespread acceptance and implementation of international of responsible behavior as well as confidence-building measures in cyberspace.
 
ZDNet:       Wired:    
 
You Might Also Read: 
 
UN Chief Urges Global Rules For Cyber Warfare:
 
Russia And US Offer Competing Visions Of Cyber Normality:
 
« Schoolboy Hacked Mock Florida Election Site In 10 Minutes
Dozens of Spies Killed Thanks To Flawed CIA Comms System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Cyan Forensics

Cyan Forensics

Cyan Forensics provides digital forensics software to help police forces find evidence on computers many times faster than before.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.