Rules

Excerpt from the rules

PREAMBLE

The misuse of cyberspace by sophisticated electronic means presents ICT managers, information security managers, crisis managers and government authorities with new, constantly changing threats and dangers in three areas:

  • Espionage: Targeted attacks for the purpose of obtaining confidential data and information
  • Sabotage: Malware attacks intended to infiltrate control systems and sabotage critical infrastructures
  • Crime: The increasing professionalization and internationalisation of computer and internet crime (cybercrime) result in major private and economic losses.

While simple incidents are dealt with through service level agreements, more complex attacks often go undetected for years and are not assessed quickly enough when they are discovered.

The purpose here is to use CE-P to create a method for efficiently accessing expertise from the ICT industry in the event of a major incident. The aim of association members is to quickly detect major cyber incidents and analyse them in order that the companies under contract can effectively resolve them.

The association is open to Swiss (subsidiary) companies that can contribute experts to the pool and thus make a substantial contribution to the assessment of serious cyber incidents.

PURPOSE

The association’s purpose is:

  • The networking of private business ICT expertise in order to…
  • …intensify and systematise the transfer of knowledge while responding to serious cyber incidents which overwhelm the victim’s resources or those of its associated agents
  • Improvement of phenomenological findings
  • Expansion of technical competences
  • Development of preventative measures
  • Availability of a central point of contact for the public authorities.

The association does not pursue any commercial goals and is not profit-based but it works with an operationally balanced account.

AREAS OF ACTIVITY

Common activities help to achieve these aims in the following areas:

  • Providing experts in specific individual cases
  • Exchanging information and knowledge
  • Documenting implemented measures
  • Presenting implemented measures

The following is secondary:

  • Mutual shadowing
  • Researching and reducing the dark field