Security for ICT - the Work of ETSI

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involvement in the standardization of security in that area. Some of our major achievements are then highlighted and ongoing activities are described. At the end of the paper, all ETSI's specifications and standards for security are listed. Listed documents referenced in the text are indicated by a number in [ ]. Each ETSI document number in the list of publications at the end of this paper links to the ETSI deliverable available online, from where the latest published version at the time of your search can be downloaded, as well as any previous versions.

Spotlight

Skyport Systems

At Skyport Systems we develop Hyper-Secured Infrastructure that ensures the security of critical IT and corporate assets, with tight integration of compute, security, virtualization and policy management. We believe that computing infrastructure should be secured-by-default, starting with a secure supply-chain, validating the hardware and software integrity continuously, add an additional policy enforcement point as close to the workload as possible, and continuously monitor and audit every transaction, connection, and administrative action with a secure data warehouse. Our leadership team includes some of the world’s leading experts in virtualization, cryptography, systems engineering, site reliability engineering, and networking with a consistent track record of business success. We are always on the lookout for amazing people and would love to get to know you. Skyport is funded by Sutter Hill Ventures, Index Ventures, Intel Capital, Cisco, and Google Ventures.

OTHER WHITEPAPERS
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

ScienceLogic Global Security

whitePaper | September 30, 2022

As organizations become more digital in nature, securing the data becomes a top-of-mind priority given the cybersecurity challenges. ScienceLogic is committed to making the necessary investments in security and providing the transparency to gain the trust of our customer and partners.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More

Spotlight

Skyport Systems

At Skyport Systems we develop Hyper-Secured Infrastructure that ensures the security of critical IT and corporate assets, with tight integration of compute, security, virtualization and policy management. We believe that computing infrastructure should be secured-by-default, starting with a secure supply-chain, validating the hardware and software integrity continuously, add an additional policy enforcement point as close to the workload as possible, and continuously monitor and audit every transaction, connection, and administrative action with a secure data warehouse. Our leadership team includes some of the world’s leading experts in virtualization, cryptography, systems engineering, site reliability engineering, and networking with a consistent track record of business success. We are always on the lookout for amazing people and would love to get to know you. Skyport is funded by Sutter Hill Ventures, Index Ventures, Intel Capital, Cisco, and Google Ventures.

Events