Global Cyber Alliance To Tackle The Biggest Risks

The Global Cyber Alliance (GCA) has been launched, holding its first strategic advisory committee (SAC) meeting recently at the New York Federal Reserve Bank.

The mission of GCA is to identify systemic cyber-risks where significant progress can be made on risk mitigation, and then to bring together the people and resources to identify and implement a solution—to take action—and to measure the effect. The outcome of this effort is not a report with recommendations but actual risk reduction moving forward on a path to eradicate a systemic cyber-risk.

The SAC is chaired by the GCA's three founding partners; the New York County District Attorney Cyrus R. Vance, Jr., London Police Commissioner Ian Dyson and Chair of the Center for Internet Security, John Gilligan.

GCA will regularly assess the top cyber-risks that the collective community believes are significant threats to the global, online community and for which GCA can have a measurable, positive impact on the eradication of the risk.

To that end, GCA has decided to tackle phishing by driving implementation of two solutions that have been shown to be effective—limiting spoofing of email (through DMARC) and minimizing the effect of phishing and other attacks (through secure DNS practices).

"The Global Cyber Alliance was borne out of a shared commitment to reducing cyber risk worldwide,” Vance said. “By focusing the institutional knowledge and resources of stakeholders on select challenges, GCA will be able to isolate and address key vulnerabilities adversely affecting individuals and organizations all over the world, ultimately benefitting those in both the public and private sectors."

At the Strategic Advisory Committee meeting, the Global Cyber Alliance presented several top systemic risks to consider tackling through task groups focused on implementation: Phishing; risks arising from weak identity and authentication mechanisms; risks arising from vulnerable and compromised websites; and distributed denial of service (DDoS) attacks.

"I have firsthand knowledge of the power of the collective effort to make systemic changes to improve our cybersecurity posture,” said Gilligan. “GCA’s mission is to confront these risks on an international scale which is critical in this day and age. The SAC meeting reconfirmed the importance of working together to confront these top risks."

Dyson added, "The Global Cyber Alliance has identified the biggest risks to businesses and individuals globally from cyber crime. By prioritizing the risks that cause the most harm, the alliance can build solutions that can make the cyber-world a safer place in the future."
Infosecurity: http://bit.ly/1pjNwDP

« Cybersecurity Training For US Undergraduates Is Dismal
Is Predictive Policing The Future? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.