Skip to content
Cybersecurity Tech Accord

Cybersecurity Tech Accord

  • IoT Security
    • Overview
    • What Is IoT?
    • Resources for Consumers
    • Resources for Manufacturers
  • About
    • Our Commitment
    • Signatories
  • Resources
    • Announcements
    • Case Studies
    • Cyber Hygiene
    • Events
    • Policy Submissions
    • Publications
    • Signatory Blogs
    • Vulnerability Disclosure Policies
    • Webinars
  • Contact
  • Twitter
  • YouTube

Policy Submissions

The Cybersecurity Tech Accord’s Feedback on the Pall Mall Process – Code of Practice for States to Tackle the Proliferation and Irresponsible Use of Commercial Intrusion Capabilities
March 2025March 19, 2025

The Cybersecurity Tech Accord’s Feedback on the Pall Mall Process – Code of Practice for States to Tackle the Proliferation and Irresponsible Use of Commercial Intrusion Capabilities

Responsible State Behaviour in Cyberspace: Cybersecurity Tech Accord Renews Calls for a New Norm on ICT Supply Chain
March 2024March 6, 2024

Responsible State Behaviour in Cyberspace: Cybersecurity Tech Accord Renews Calls for a New Norm on ICT Supply Chain

Cybersecurity Tech Accord delivers statement, hosts event during informal intersessional OEWG on ICT
December 2022April 6, 2023

Cybersecurity Tech Accord delivers statement, hosts event during informal intersessional OEWG on ICT

Industry Perspective on Tackling Cybercrime: Cybersecurity Tech Accord guidance to UN cybercrime treaty negotiations
August 2022April 6, 2023

Industry Perspective on Tackling Cybercrime: Cybersecurity Tech Accord guidance to UN cybercrime treaty negotiations

Industry support in ICT security capacity-building: Cybersecurity Tech Accord guidance to the UN Conference on Disarmament
August 2022April 6, 2023

Industry support in ICT security capacity-building: Cybersecurity Tech Accord guidance to the UN Conference on Disarmament

Securing the Next Generation of Connected Consumer Products
February 2022July 25, 2022

Securing the Next Generation of Connected Consumer Products

February 2022July 25, 2022

One Step Forward, Two Steps Back – The OEWG Needs Multistakeholder Inclusion

First Multistakeholder Manifesto on Cybercrime Widens its Reach
December 2021July 25, 2022

First Multistakeholder Manifesto on Cybercrime Widens its Reach

A Statement on the Programme of Action: A standing UN body to uphold international expectations is the best hope for stability in cyberspace
October 2021July 25, 2022

A Statement on the Programme of Action: A standing UN body to uphold international expectations is the best hope for stability in cyberspace

Joint Civil Society Statement on Cyber Peace and Human Security at the 2021 UN General Assembly First Committee on Disarmament and International Security
October 2021July 25, 2022

Joint Civil Society Statement on Cyber Peace and Human Security at the 2021 UN General Assembly First Committee on Disarmament and International Security

The Multistakeholder Manifesto on Cybercrime: A call for responsible action and inclusion
September 2021July 25, 2022

The Multistakeholder Manifesto on Cybercrime: A call for responsible action and inclusion

Discussions on cyberspace security need to be more inclusive, says Paris Call Working Group
August 2021July 25, 2022

Discussions on cyberspace security need to be more inclusive, says Paris Call Working Group

Welcoming ETSI’s core criteria for consumer IoT security
April 2021July 25, 2022

Welcoming ETSI’s core criteria for consumer IoT security

Cybersecurity Tech Accord response to OEWG’s draft final report
March 2021March 10, 2021

Cybersecurity Tech Accord response to OEWG’s draft final report

WHOIS counting? The Cybersecurity Tech Accord response to ICANN’s most recent recommendations
February 2021July 25, 2022

WHOIS counting? The Cybersecurity Tech Accord response to ICANN’s most recent recommendations

Cybersecurity Tech Accord Response: Priority 2 Policy Recommendations for ICANN Board Consideration from EPDP Phase 2
February 2021February 12, 2021

Cybersecurity Tech Accord Response: Priority 2 Policy Recommendations for ICANN Board Consideration from EPDP Phase 2

January 2021July 25, 2022

Ambitious cybersecurity plans for the European Union (EU): Bolstering defenses and strengthening the Union’s voice internationally

Calling on the UN General Assembly to prioritize digital trust and security
October 2020July 25, 2022

Calling on the UN General Assembly to prioritize digital trust and security

Multi-factor authentication (MFA): A foundational cyber defense for organizations
October 2020July 25, 2022

Multi-factor authentication (MFA): A foundational cyber defense for organizations

Basic cyber hygiene: The importance of patching
August 2020July 25, 2022

Basic cyber hygiene: The importance of patching

Basic cyber hygiene: Protect against “password spray”
August 2020July 25, 2022

Basic cyber hygiene: Protect against “password spray”

Basic cyber hygiene: The benefits of using a virtual private network (VPN)
August 2020July 25, 2022

Basic cyber hygiene: The benefits of using a virtual private network (VPN)

Tech Accord reflections and comments on Geneva Dialogue background document
July 2020July 25, 2022

Tech Accord reflections and comments on Geneva Dialogue background document

Cybersecurity Tech Accord comments on OECD work on Digital Security
June 2020June 29, 2020

Cybersecurity Tech Accord comments on OECD work on Digital Security

Posts navigation

Older posts
OSZAR »