NTT joined Cybersecurity Tech Accord, a growing global industry agreement to protect users and customers everywhere
The Cybersecurity Tech Accord is a public commitment among more than 80 global companies, which oversee important aspects of the world's communication and information infrastructure, to protect and empower civilians online and to improve the security, stability and resilience of cyberspace.
With the growing number of devices connected to the Internet as the foundation for digital era, the impact of threats and the importance of cybersecurity have never been more serious ever, and global cooperation in the industry is crucial to make the Internet safer place. By signing the Cybersecurity Tech Accord, NTT accelerate our mission to resolve social issues by becoming "Your Value Partner" for clients pursuing digital transformation and improved lives.
The signatories made commitments in four areas:
- Stronger defense:
- The companies will mount a stronger defense against cyberattacks. As part of this, recognizing that everyone deserves protection, the companies pledged to protect all customers globally regardless of the motivation for attacks online.
- No offense:
- The companies will not help governments launch cyberattacks against innocent citizens and enterprises, and will protect against tampering or exploitation of their products and services through every stage of technology development, design and distribution.
- Capacity building:
- The companies will do more to empower developers and the people and businesses that use their technology, helping them improve their capacity for protecting themselves. This may include joint work on new security practices and new features the companies can deploy in their individual products and services.
- Collective action:
- The companies will build on existing relationships and together establish new formal and informal partnerships with industry, civil society and security researchers to improve technical collaboration, coordinate vulnerability disclosures, share threats and minimize the potential for malicious code to be introduced into cyberspace.