SlideShare a Scribd company logo
1 of 30
European Cyber and Data security, 
What is coming and how we can be prepared 
for it
Who Am I?
Who Am I? 
CEO of BH Consulting – Independent Information Security Firm 
 Founder & Head of IRISSCERT – Ireland’s first Computer 
Emergency Response Team 
 Special Advisor on Internet Security Europol's CyberCrime 
Centre (EC3) 
 Adjunct Lecturer at University College Dublin 
 Expert Advisor to European Network & Information Security 
Agency (ENISA) 
 Regularly comments on media stories – 
BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times
“considers cybercrime to be an 
ever-increasing threat to the EU in 
the form of large-scale data 
breaches, online fraud and child 
sexual exploitation, while profit-driven 
cybercrime is becoming an 
enabler for other types of criminal 
activity..” 
Europol Serious & Organised Threat 
Assessment 2013
“Total Global Impact of 
CyberCrime US$ 3 Trillion, making 
it more profitable than the global 
trade in marijuana, cocaine and 
heroin combined.” 
Europol Serious & Organised Threat 
Assessment 2013
“cybercrime as one of nine EU 
priorities in the fight against 
serious and organised crime 
between 2014 and 2017” 
The Justice and Home Affairs Council 
of 6-7 June 2013
Policy on Critical Information Infrastructure Protection (CIIP) 
– 2009 
Focusing on the protection of Europe from cyber disruptions 
by enhancing security and resilience. 
 Based on five pillars: 
 Preparedness and prevention 
 Detection and response 
 Mitigation and recovery 
 International cooperation 
 Criteria for European Critical Infrastructures in the field 
of ICT.
DIRECTIVE 2011/92/EU OF THE EUROPEAN PARLIAMENT 
AND OF THE COUNCIL 
of 13 December 2011 
on combating the sexual abuse and sexual exploitation of 
children and child pornography, and replacing Council 
Framework Decision 2004/68/JHA 
(to be transposed into national law in the Member States by 18th 
December 2013)
DIRECTIVE 2013/40/EU OF THE EUROPEAN PARLIAMENT 
AND OF THE COUNCIL 
of 12 August 2013 
on attacks against information systems and replacing 
Council Framework Decision 2005/222/JH 
(to be transposed into national law in the Member States by 4th 
September 2015)
 This Directive 
 Sets out minimum rules defining criminal offences. 
 Improves operational cooperation between Member 
States’ national law enforcement services 
 Improves operational cooperation between Member 
States and relevant EU agencies (Eurojust, Europol, 
ENISA). 
 Member States have to respond within eight hours to 
an urgent request related to a cyber-attack. 
 EU agencies will conduct threat assessments and 
strategic analyses of cybercrime 
 All such activities have also to comply with existing EU 
legislation on privacy and electronic communication 
and data protection
 The main crimes defined in the Directive are 
 illegal access to information systems, 
 illegal interference with systems or data, 
 illegal interception of data transmissions, 
 stricter criminal sanctions for botnets
EU Cyber Security Strategy - 2013 
 Key Priorities For the Strategy 
 Freedom and openness 
 The EU's laws, norms and core values apply as much 
in cyberspace as in the physical world 
 Developing cyber security capacity building 
 Fostering international cooperation in cyberspace
The Cyber Security Directive 
(formally known as the Network & Information Security 
Directive) (the Directive) 
 bring all member states to a minimum security standard 
 promote cooperation and ensure preparedness and 
transparency in important sectors 
 introduce mandatory breach notification for certain 
organisations 
 All member states to develop a National Security Strategy 
 Appointment of a single point of contact among national 
competent authorities (NCAs)
Changes to Data Protection Directive 
 View to being ratified in 2015 
 Fines of up to €100 million or 5% of Global Turnover for Data 
Breaches 
 Mandatory Breach Notification “without undue delay” 
 Right to Be Forgotten 
 Companies with more than 250 employees will need to have a 
Data Protection Officer 
 Privacy by Default baked into all business processes & 
services
Trend Micro's UK Study re Data Protection Directive 
 50% of UK IT decision makers were unaware of the 
impending legislation 
 25% percent adamant that compliance is not achievable
Objectives 
 To enhance the capability of the Commission, other EU bodies and the 
Member States to prevent, address and to respond to NIS problems 
 To provide assistance and deliver advice to the Commission and the MS on 
issues related to NIS falling within its competencies as set out in this 
Regulation 
 To develop a high level of expertise and use this expertise to stimulate broad 
cooperation between actors from the public and private sectors 
 To assist the Commission, where called upon, in the technical preparatory 
work for updating and developing Community legislation in the field of NIS.
 Computer Emergency Response Teams 
 Resilience of Networks and Services and Critical Information 
Infrastructure Protection 
 Identity, Privacy and Trust 
 Risk Management 
Areas of Research
National Cyber Security Strategies
Countries aligned for the deployment of the European Cyber 
Security Month
List of available courses and certification 
programmes
@BrianHonan 
Brian.honan@bhconsulting.ie

More Related Content

What's hot

Secure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance SectorSecure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance Sector
Eftychia Chalvatzi
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...
Eftychia Chalvatzi
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
manelmedina
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
segughana
 

What's hot (20)

GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
Secure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance SectorSecure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance Sector
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...
 
Data Protection Institutions in EU
Data Protection Institutions in EUData Protection Institutions in EU
Data Protection Institutions in EU
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
Hannes astok digital_security_2012
Hannes astok digital_security_2012Hannes astok digital_security_2012
Hannes astok digital_security_2012
 
EU data protection issues in IoT
EU data protection issues in IoTEU data protection issues in IoT
EU data protection issues in IoT
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
NIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices GuideNIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices Guide
 
NIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices GuideNIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices Guide
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
 
EU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe HarborEU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe Harbor
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyer
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 

Viewers also liked

Le droit au service du secret des affaires
Le droit au service du secret des affairesLe droit au service du secret des affaires
Le droit au service du secret des affaires
Benjamin Benifei
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
 
Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009
Tiina Sarisalmi
 
10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco Industry10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco Industry
ANM Farukh
 
Power point tema 6 : la hidrosfera
Power point tema 6 : la hidrosferaPower point tema 6 : la hidrosfera
Power point tema 6 : la hidrosfera
characas
 

Viewers also liked (20)

Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the Cloud
 
directive secret des affaires (en anglais)
directive secret des affaires (en anglais)directive secret des affaires (en anglais)
directive secret des affaires (en anglais)
 
Le droit au service du secret des affaires
Le droit au service du secret des affairesLe droit au service du secret des affaires
Le droit au service du secret des affaires
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatiqueNIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
 
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa? FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
 
Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009
 
Hot Topics For 2010
Hot Topics For 2010Hot Topics For 2010
Hot Topics For 2010
 
Christopher Warren
Christopher  WarrenChristopher  Warren
Christopher Warren
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp Bh
 
10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco Industry10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco Industry
 
Regina drury firepole marketing presentation
Regina drury firepole marketing presentationRegina drury firepole marketing presentation
Regina drury firepole marketing presentation
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
Power point tema 6 : la hidrosfera
Power point tema 6 : la hidrosferaPower point tema 6 : la hidrosfera
Power point tema 6 : la hidrosfera
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident Response
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
 

Similar to Presentation on EU Directives Impacting Cyber Security for Information Security Ireland

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
Yury Chemerkin
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
pteromys_volans
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 
Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPR
Pavol Balaj
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
Petar Radanliev
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951
N0b10111
 

Similar to Presentation on EU Directives Impacting Cyber Security for Information Security Ireland (20)

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPR
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countriesDay 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
30-31 BB Nov_Dec14 (3)
30-31 BB Nov_Dec14 (3)30-31 BB Nov_Dec14 (3)
30-31 BB Nov_Dec14 (3)
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Proposal for a Regulation establishing the interoperability of EU informatio...
 Proposal for a Regulation establishing the interoperability of EU informatio... Proposal for a Regulation establishing the interoperability of EU informatio...
Proposal for a Regulation establishing the interoperability of EU informatio...
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951
 

More from Brian Honan

More from Brian Honan (16)

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynote
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Brian honan
Brian honanBrian honan
Brian honan
 
The dark side of the internet
The dark side of the internetThe dark side of the internet
The dark side of the internet
 
Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honan
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gap
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloud
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP Speed
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing You
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From Ireland
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Presentation on EU Directives Impacting Cyber Security for Information Security Ireland

  • 1. European Cyber and Data security, What is coming and how we can be prepared for it
  • 3. Who Am I? CEO of BH Consulting – Independent Information Security Firm  Founder & Head of IRISSCERT – Ireland’s first Computer Emergency Response Team  Special Advisor on Internet Security Europol's CyberCrime Centre (EC3)  Adjunct Lecturer at University College Dublin  Expert Advisor to European Network & Information Security Agency (ENISA)  Regularly comments on media stories – BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times
  • 4.
  • 5.
  • 6. “considers cybercrime to be an ever-increasing threat to the EU in the form of large-scale data breaches, online fraud and child sexual exploitation, while profit-driven cybercrime is becoming an enabler for other types of criminal activity..” Europol Serious & Organised Threat Assessment 2013
  • 7. “Total Global Impact of CyberCrime US$ 3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.” Europol Serious & Organised Threat Assessment 2013
  • 8. “cybercrime as one of nine EU priorities in the fight against serious and organised crime between 2014 and 2017” The Justice and Home Affairs Council of 6-7 June 2013
  • 9.
  • 10. Policy on Critical Information Infrastructure Protection (CIIP) – 2009 Focusing on the protection of Europe from cyber disruptions by enhancing security and resilience.  Based on five pillars:  Preparedness and prevention  Detection and response  Mitigation and recovery  International cooperation  Criteria for European Critical Infrastructures in the field of ICT.
  • 11. DIRECTIVE 2011/92/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornography, and replacing Council Framework Decision 2004/68/JHA (to be transposed into national law in the Member States by 18th December 2013)
  • 12. DIRECTIVE 2013/40/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JH (to be transposed into national law in the Member States by 4th September 2015)
  • 13.  This Directive  Sets out minimum rules defining criminal offences.  Improves operational cooperation between Member States’ national law enforcement services  Improves operational cooperation between Member States and relevant EU agencies (Eurojust, Europol, ENISA).  Member States have to respond within eight hours to an urgent request related to a cyber-attack.  EU agencies will conduct threat assessments and strategic analyses of cybercrime  All such activities have also to comply with existing EU legislation on privacy and electronic communication and data protection
  • 14.  The main crimes defined in the Directive are  illegal access to information systems,  illegal interference with systems or data,  illegal interception of data transmissions,  stricter criminal sanctions for botnets
  • 15. EU Cyber Security Strategy - 2013  Key Priorities For the Strategy  Freedom and openness  The EU's laws, norms and core values apply as much in cyberspace as in the physical world  Developing cyber security capacity building  Fostering international cooperation in cyberspace
  • 16. The Cyber Security Directive (formally known as the Network & Information Security Directive) (the Directive)  bring all member states to a minimum security standard  promote cooperation and ensure preparedness and transparency in important sectors  introduce mandatory breach notification for certain organisations  All member states to develop a National Security Strategy  Appointment of a single point of contact among national competent authorities (NCAs)
  • 17. Changes to Data Protection Directive  View to being ratified in 2015  Fines of up to €100 million or 5% of Global Turnover for Data Breaches  Mandatory Breach Notification “without undue delay”  Right to Be Forgotten  Companies with more than 250 employees will need to have a Data Protection Officer  Privacy by Default baked into all business processes & services
  • 18. Trend Micro's UK Study re Data Protection Directive  50% of UK IT decision makers were unaware of the impending legislation  25% percent adamant that compliance is not achievable
  • 19.
  • 20. Objectives  To enhance the capability of the Commission, other EU bodies and the Member States to prevent, address and to respond to NIS problems  To provide assistance and deliver advice to the Commission and the MS on issues related to NIS falling within its competencies as set out in this Regulation  To develop a high level of expertise and use this expertise to stimulate broad cooperation between actors from the public and private sectors  To assist the Commission, where called upon, in the technical preparatory work for updating and developing Community legislation in the field of NIS.
  • 21.  Computer Emergency Response Teams  Resilience of Networks and Services and Critical Information Infrastructure Protection  Identity, Privacy and Trust  Risk Management Areas of Research
  • 22.
  • 24.
  • 25. Countries aligned for the deployment of the European Cyber Security Month
  • 26. List of available courses and certification programmes
  • 27.
  • 28.
  • 29.