Scope and Field of Application
|
Provide a universal, inclusive structured framework- repository directory that identifies cybersecurity activity clusters and associated commonly used specifications that entail information exchange and associated information repositories. Responsible parties, network location and availability are included. These clusters include: vulnerabilities, weaknesses, threats, incidents, playbooks, BOMs, risk assessments, testing, etc. The NWI borrows on work began in ITU-T twenty years ago and entails collaboration with a broad array of bodies, including the open-source community. Uses involving cybersecurity legislative instruments such as those in the EU, as well as industry norms, will be identified and information repositories - especially those used for AI LLM ingestion - will be included. Collaboration will include TCs SAI and DATA. The ETSI Forge and OID leaf will be used for the UCYBEX repository-directory.
|
Supporting Organizations
|
TELEFONICA S.A., Cadzow Communications, SBS aisbl, NCSC, CIS, DSIT, EUCOMREG, Accenture, Maketh Secure Limited, Palo Alto Networks
|