https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Charter of Trust

Charter of Trust: Siemens, NXP, Partners’ Growing Alliance

Why the Charter of Trust cybersecurity initiative is gaining momentum. 
  • Written by Brian Buntz
  • 24th July 2019

Do we live in a post-trust age?

Shiv Singh and Rohini Luthra, Ph.D. argue as much in a book titled “Savvy: Navigating Fake Companies, Fake Leaders and Fake News in the Post-Trust Era.” “We’re experiencing a massive breakdown of trust in the institutions that govern societies. We are in a crisis of trust,” they write. 

Amidst this backdrop is a world in which cybersecurity crises have become ordinary. The Equifax data breach affected nearly 150 million Americans. The 2017 WannaCry ransomware sabotaged U.K.’s National Health Service. Also from 2017, NotPetya wrought hundreds of millions of dollars in damages from a global shipping company. All 3 billion of Yahoo’s users were impacted in a 2013 breach. For some companies, the cost of a cyber-breach can be staggering. According to a 2018 McAfee estimate, the financial toll of cyber-crime internationally is in the ballpark of $600 billion annually. 

Despite such chaos, the bulk of society continues to trust the underlying infrastructure that helps drive the modern economy and life as we know it. But what happens, say, if cyber terrorists were able to shut off power to a metropolis for days on end in the heat of summer or during a winter storm? Or what if black hat hackers caused a slew of accidents by, say, exploiting autonomous or semi-autonomous vehicles or taking control over industrial control systems? While it is impossible to predict what future cyberattacks will look like, the blurring of the lines between the digital and physical is leading to new attack possibilities. 

Emerging technologies such as IoT and broad frameworks such as digital transformation are helping drive a growing attack surface for threat actors to target. Ultimately, digital technology promises to fundamentally change every industry, whether it is process and discrete manufacturing, health care, critical infrastructure or the consumer electronics niche. “Emerging technologies, from edge and cloud, to connectivity, to machine learning to smart transducers, are causing the digital transformation of society,” said Fari Assaderaghi, senior vice president, innovation and advanced technologies at NXP in the panel discussion “From Demand to Design: How Digital Security is Transforming the Industrial World” held last month at NXP Connects Silicon Valley. 

There is a growing need for “a new approach to digital safety and security,” as Leo Simonovich, vice president and global head for industrial cyber and digital security at Siemens said in May. In a world where everything from cars to industrial machines to medical devices to the power grid are computerized and networked, cyberattacks could threaten our safety as well as data. The power grid, industrial facilities and critical infrastructure are all vulnerable to cyber-sabotage. For instance, a 2017 Ponemon Institute study of the U.S. oil and gas industry learned more than two-thirds of respondents had at least one security compromise in the prior year.

And yet, despite the widespread attention cybersecurity receives in the media, many organizations continue to be largely unconcerned. “For many players in the industry today, security is a relatively new thing to think about,” said Svend Buhl, director of communications at NXP. “And yet, there is a fundamental shift coming through the IoT, which has changed people’s awareness of security, and how the industry handles security.” 

As a case in point: In 2018, Siemens and eight partners, including NXP, announced their participation in an initiative known as the Charter of Trust, which provides a set of common principles designed to reduce cyber-risk broadly. In reference to the question posed at the beginning of this article, the Charter of Trust intends to safeguard trust as organizations of all stripes pursue digital transformation initiatives. 

Since ratification, the Charter continues to expand. Now including 16 members, Mitsubishi Heavy Industries has announced its intent to become the first Asian member later this year. Other organizations that have signed the Charter include: Airbus, Allianz, Cisco, Daimler, Dell Technologies and IBM.

One of the first areas of focus for the consortium is Principle 2: “Responsibility throughout the digital supply chain.” 

“All of the members have agreed to zero in on that. The idea here, of course, is that if we all focus in that area, it helps to drastically reduce the attack surface that some threat actors can use,” said Kurt John, U.S. chief information security officer at Siemens. “In terms of the second principle, Siemens has identified the top 300 suppliers globally and we are working with them to make sure they are implementing cybersecurity by default.” 

In NXP’s case, implementing cybersecurity by default means leveraging its experience helping to secure e-passports and banking applications. “In our broader product portfolio, we took that the thinking we used to make passport or banking applications safe, and transferred that to different industries and verticals,” Buhl said. “When building chip solution architectures, we start by thinking, first and foremost, from the perspective of, not only functionality or energy efficiency but also security.” 

One of the chief aims of the Charter of Trust is to help a company like NXP share its expertise in hardware security with other members of the consortium, while also learning from other members. The growing interest in edge computing makes hardware more important, Buhl said, because “edge devices themselves are becoming the first line of defense against cyberattacks. “A lot of data is now stored at the edge, and that makes edge devices valuable targets for attackers,” he explained. 

Edge computing is one single facet of the Charter of Trust’s focus. The idea behind the consortium is to not just enable members to share best practices, but to be able to identify a shared way of talking about cybersecurity. “We speak the same language, we focus on the same things,” John said. “We can exchange stories because our efforts are jointly aligned in the same direction.”

Ultimately, one of the most important dimensions of the Charter of Trust is its connection to society. “These 10 principles that everyone has agreed to who signed on to this Charter of Trust gives us all guiding principles so that we all know that the products, services and solutions we’re providing to society meet a certain standard,” John said. 

Tags: IIoT/Manufacturing Security Features

Related


  • Image shows welding robotics and a digital manufacturing operation.
    IoT Supply Chain Vulnerability Poses Threat to IIoT Security
    The supply chain provides building blocks for IoT but also vulnerabilities. IT pros need to ward against malicious attacks that exploit supply chain security gaps.
  • IoT Security Needs Pen Testing Approach
    IoT pen testing is a no-brainer, say experts. But don’t test everything.
  • Supply Chain Analytics and IoT Loom Large in Wake of 2020 Disruption
    The COVID-19 crisis has made disruptive events par for the course. Supply chain analytics, digital twins and other tools have become key to understanding and predicting disruption.
  • IoT App Development Gets Agility Boost From Container Technologies
    IoT app development has clamored for greater agility, productivity and security. Container technologies can realize those benefits.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Securing IoT at the Edge Is Key to Safe IoT Operations
  • Industrial Transformation Faces Rocky Road in 2020
  • Adoption of the Internet of Robotics Things Accelerates
  • Building a Foundation for AI in Cybersecurity

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021
IoTWorldToday, IoTWorldSeries

How IoT Devices Can Enhance the Connected Customer Experience dlvr.it/RtPcvS

24th February 2021
IoTWorldToday, IoTWorldSeries

🤝 Meet #EIOTWORLD speaker Ingo Feldner, Project Lead for Virtual #Hardware Platforms at @RobertBoschGmbH 📅 Join hi… twitter.com/i/web/status/1…

24th February 2021
IoTWorldToday, IoTWorldSeries

Developing IoT Applications with Rust: Using a Rust Development Environment dlvr.it/RtNqrk https://t.co/wOmnoz2UVT

24th February 2021
IoTWorldToday, IoTWorldSeries

Chip-Enabled Edge AI Drives Next-Gen IoT dlvr.it/RtKcMQ https://t.co/dLjBzE6Qei

23rd February 2021
IoTWorldToday, IoTWorldSeries

The eSIM Cookbook – Towards the Next Generation of Connected Devices dlvr.it/RtG5bB https://t.co/5kXa8Pnv4T

22nd February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X