Skip to content
Home » Services » Organising accountability » Coordinated Vulnerability Disclosure (CVD)

Coordinated Vulnerability Disclosure (CVD)

[vc_row][vc_column][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text]

Managing vulnerabilities

Cyber threats arise from vulnerabilities in the ICT infrastructure, applications and/or in the organization of business activities. They can undermine the effective protection of company activities and of company and personal data. Ultimately, these vulnerabilities can threaten the continuity of business operations and even shut down a company. The causes of the vulnerabilities can lie in, for example, the complexity of the digital systems, the lack of “security by design”, incorrect implementation and/or insufficient testing. The causes can also lie with chain partners who supply products, applications and services to the company.

Follow the link on the website of MYOBI, CVD.

Sharing research results

A vulnerability can be noticed by an unknown researcher. If this researcher is in good faith, he will be happy to share the research results with the company. It is important to properly handle the investigator/reporter and the report to prevent the information from falling into unwanted hands before the company can fix the vulnerability.

With a Coordinated Vulnerability Disclosure (CVD) policy, a company can arrange that vulnerabilities identified outside the company are handled in a controlled manner (under your direction). The policy specifies frameworks for documenting and analyzing these vulnerabilities and for quickly resolving them by taking appropriate measures. As a result, the consequences for business operations are limited. On the website, the company states in a CVD Policy how vulnerabilities can be reported and under what conditions.

Embedding in your own organization

Before a company can go public with a CVD Statement, CVD must first be set up in its own organization. After all, promising a researcher to work according to agreements and then not fulfilling them can have the opposite effect, causing the researcher to take other paths to exploit the vulnerability.

[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_row_inner el_class=”third_bg_color”][vc_column_inner el_class=”third_bg_color” css=”.vc_custom_1574398098802{padding-top: 40px !important;padding-right: 40px !important;padding-bottom: 40px !important;padding-left: 40px !important;}”][vc_custom_heading stripe_pos=”hide” text=”How can we help you?” font_container=”tag:h4|text_align:left|color:%23ffffff” use_theme_fonts=”yes” el_class=”remove_padding”][vc_column_text css=”.vc_custom_1665500490799{margin-bottom: 20px !important;}”]Feel free to contact us via +31 (0) 70 392 22 09 or info@duthler.nl. Make an appointment with André Biesheuvel, the CVD service owner, or a professional from his team.[/vc_column_text][vc_btn title=”Contact us” style=”flat” color=”white” i_icon_fontawesome=”stm-lnr-phone” add_icon=”true” link=”url:https%3A%2F%2Fduthler.nl%2Fen%2Fcontact%2F|title:Contact%20us|target:_blank|”][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_row_inner el_class=”third_bg_color”][vc_column_inner el_class=”third_bg_color” css=”.vc_custom_1574398098802{padding-top: 40px !important;padding-right: 40px !important;padding-bottom: 40px !important;padding-left: 40px !important;}”][vc_custom_heading stripe_pos=”hide” text=”Download the white paper here” font_container=”tag:h4|text_align:left|color:%23ffffff” use_theme_fonts=”yes” el_class=”remove_padding”][vc_column_text css=”.vc_custom_1668618891280{margin-bottom: 20px !important;}”]Download here the white paper ‘Coordinated Vulnerability Disclosure (CVD)’[/vc_column_text][vc_btn title=”Download here (pdf)” style=”flat” color=”white” i_icon_fontawesome=”stm-lnr-phone” add_icon=”true” link=”url:https%3A%2F%2Fduthler.nl%2Fwp-content%2Fuploads%2F2021%2F07%2F220531-White-paper-organiseren-Coordinated-Vulnerability-Disclosure-CVD-Duthler-Associates.pdf|title:Download|target:_blank|”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tabs][vc_tta_section title=”Organizing CVD” tab_id=”1652455839336-a345e98c-d85fddbb-b03e”][vc_column_text]

A company has to make choices about how it wants to organize CVD. If there is little knowledge and/or capacity available, it can be decided to outsource the process. You can also opt for partial outsourcing and supplementing your own knowledge through training.

We can support you with:

  • Supporting the preparation of a business case to explore possibilities and make informed decisions;
  • Drawing up an internal CVD policy and an external CVD policy;
  • Developing roles, tasks and powers;
  • Drawing up a procedure to handle a report properly and in a timely manner, including documentation and reporting;
  • Making agreements with experts to be available on demand when dealing with a vulnerability such as technical IT knowledge and legal knowledge;
  • Training employees to perform roles; and
  • Maintaining contact with the reporter.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Recognizing vulnerabilities” tab_id=”1656015026477-66e45a1d-9b69″][vc_column_text]

Most companies use cloud service providers to support business processes with IT products and services that effectively organize business operations. Most cloud services, the company offers a range of professional controls targeting, for example, the NIST CyberSecurity Framework Core, April, 2018.

MYOBI Trust Network adds to this NIST framework the management of vulnerabilities in company IT products and services identified by researchers; a Coordinated Vulnerability Disclosure.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Trust network helps users” tab_id=”1656014998409-edb29f1a-c6e3″][vc_column_text]

Most companies use cloud service providers to support business processes with IT products and services that effectively organize business operations. Most cloud services, the company offers a range of professional controls targeting, for example, the NIST CyberSecurity Framework Core, April, 2018.

MYOBI Trust Network adds to this NIST framework the management of vulnerabilities in company IT products and services identified by researchers; a Coordinated Vulnerability Disclosure.

[/vc_column_text][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading icon_size=”15″ text=”Do you have questions or need an appointment?” font_container=”tag:h2|font_size:25|text_align:left” use_theme_fonts=”yes”][vc_column_text]Feel free to contact us via +31 (0) 70 392 22 09 or info@duthler.nl. Or contact our specialists below.[/vc_column_text][vc_row_inner][vc_column_inner][stm_staff_list category=”organiseren-van-de-verantwoordingsplicht” style=”grid” grid_view=”minimal” per_row=”2″ count=”2″][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][vc_btn title=”Contact us” color=”theme_style_5″ size=”sm” align=”center” button_block=”true” link=”url:https%3A%2F%2Fduthler.nl%2Fen%2Fcontact%2F|title:Contact|target:_blank|”][/vc_column_inner][vc_column_inner width=”1/2″][vc_btn title=”Call me back!” color=”theme_style_5″ size=”sm” align=”center” i_icon_fontawesome=”stm-lnr-phone” button_block=”true” add_icon=”true” link=”url:https%3A%2F%2Fduthler.nl%2Fen%2Fcall-back%2F|title:Contact|target:_blank|”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]