Neither US, Russia Or China Will Sign Macron's Cyber Pact

The US, Russia and China, three of today's major cyber-powers, have not signed an agreement on rules and principles released today at the Paris Peace Forum by President Emmanuel Macron of France.
 
The pact was signed by 51 countries, the 72 companies part of The Cybersecurity Tech, the 16 companies part of The Charter of Tech,  plus 136 other private companies, and 92 non-profit organisation, universities, and advocacy groups.
 
Major American technology corporations including Microsoft, Facebook, Google, IBM, and HP all endorsed the agreement. 
The Paris Call for Trust and Security in Cyberspace, as the agreement has been named, is the most coordinated effort to date to get countries to agree on a set of international rules for cyberspace, a so-called Digital Geneva Convention.
 
Microsoft's Chief Legal Officer Brad Smith has been advocating for such a pact since 2017 after the executive had seen the damage done to the private sector by the NotPetya outbreak, which was later proved to the work of Russian state cyber-operatives attempting to wreak havoc Ukraine.
 
Besides the US, China, and Russia, other countries with important and cyber units that didn't sign the pact include Iran, Israel, and North Korea.
 
Without the signatures of these "heavy hitters," the pact is useless, albeit many suspect it was only a PR stunt. The pact was signed a day after world leaders celebrated 100 years since the end of World War I.
 
The pact doesn't include any penalties for those who signed, yet have broken the agreement's clauses. The document is more of a charter and declaration of intent to sign a future, more comprehensive agreement.
 
The Paris Call for Trust and Security in Cyberspace proposes the following measures and steps:
 
• Prevent and recover from malicious cyber activities that threaten or cause significant, indiscriminate or systemic harm to individuals and critical infrastructure;
• Prevent activity that intentionally and substantially damages the general availability or of the public core of the Internet;
• Strengthen our capacity to prevent malign interference by foreign actors aimed at undermining electoral processes through malicious cyber activities;
• Prevent ICT-enabled theft of intellectual property, including trade secrets or other confidential information, with the intent of providing competitive advantages to companies or sector;
• Develop ways to prevent the proliferation of malicious ICT and practices intended to cause harm;
• Strengthen the security of digital processes, products and, throughout their lifecycle and supply chain;
• Support efforts to strengthen an advanced cyber hygiene for all actors;
• Take steps to prevent non-State actors, including the private sector, from hacking-back, for their own purposes or those of other non-State actors;
• Promote the widespread acceptance and implementation of international of responsible behavior as well as confidence-building measures in cyberspace.
 
ZDNet:       Wired:    
 
You Might Also Read: 
 
UN Chief Urges Global Rules For Cyber Warfare:
 
Russia And US Offer Competing Visions Of Cyber Normality:
 
« Schoolboy Hacked Mock Florida Election Site In 10 Minutes
Dozens of Spies Killed Thanks To Flawed CIA Comms System »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

Mailinblack

Mailinblack

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.