SlideShare a Scribd company logo
European Union Agency for Network and Information Security www.enisa.europa.eu
European priorities in
information security
Graeme Cooper
Head of Public Affairs Unit, ENISA
12th International InfoSec and Data Storage Conference,
26th September 2013, Sheraton Hotel, Sofia, Bulgaria
European Union Agency for Network and Information Security www.enisa.europa.eu 2
EU Cubersecurity Strategy - essential points
“An Open, Safe and Secure Cyberspace”
• The norms, principles and values that the EU upholds
offline, should also apply online.
• Cyberspace must be correctly protected:
– Governments have a significant role in ensuring a free
and safe cyberspace.
– The private sector owns and operates significant parts
of cyberspace and has a leading role.
• Outside the EU, governments may misuse cyberspace for
surveillance and control.
– The EU can counter this situation by promoting freedom
online and ensuring respect of fundamental rights
online.
European Union Agency for Network and Information Security www.enisa.europa.eu 3
Economic Arguments
• By completing the Digital Single Market, Europe could boost its
GDP by almost €500 billion a year.
• For new connected technologies to take off citizens will need
trust and confidence.
– Currently, Europeans are not confident in their ability to use
the Internet for banking or purchases.
– They are also reluctant to disclose personal information.
– Across the EU, more than one in ten Internet users has been
a victim of online fraud.
• The EU economy is already affected by cybercrime activities,
economic espionage and state-sponsored activities are new
threats.
European Union Agency for Network and Information Security www.enisa.europa.eu 4
The Principles
• The strategy proposes key principles to guide the EU and
international approach:
– The EU's core values apply as much in the digital as in
the physical world.
– Fundamental rights, freedom of expression, personal
data and privacy should be protected.
– The Internet should be accessible to all citizens.
– The digital world must be subject to democratic and
efficient multi-stakeholder governance.
– Ensuring security is a shared responsibility.
European Union Agency for Network and Information Security www.enisa.europa.eu 5
Strategic Priorities
• The Five strategic objectives of the
strategy are as follows:
– Achieving cyber resilience
– Drastically reducing cybercrime
– Developing cyberdefence policy and capabilities related
to the Common Security and Defence Policy (CSDP)
– Developing the industrial and technological resources
for cybersecurity
– Establishing a coherent international cyberspace policy
for the European Union and promoting core EU values
ENISA explicitly called upon.
European Union Agency for Network and Information Security www.enisa.europa.eu 6
Achieving Cyber Resilience
• Introduces ENISA and explains the policy on NIS.
• Makes reference to articles 13a & 13b.
• Introduces the legislative proposal.
• Stresses the importance of the following:
– The establishment of a cybersecurity culture to enhance
business opportunities and competitiveness.
– Reporting significant incidents to the national NIS
competent authorities.
– Exchange of information between National NIS
competent authorities and other regulatory bodies.
– Recognises that exercises at EU level are essential to
stimulate cooperation among the MS and the private
sector.
European Union Agency for Network and Information Security www.enisa.europa.eu 7
The Legislative Proposal
• Key points:
– Will help establish common minimum requirements for
NIS at national level.
– Requires Member States to designate national
competent authorities for NIS, set up a competent CERT
and adopt a national NIS strategy and a national NIS
cooperation plan.
– Explains the role of the CERT EU regarding the EU
institutions, agencies and bodies.
– Requires the establishment of coordinated prevention,
detection, mitigation and response mechanisms.
– Requires the private sector to develop, at a technical
level, its own cyber resilience capacities and share best
practices across sectors.
European Union Agency for Network and Information Security www.enisa.europa.eu 8
Achieving Cyber Resilience (1 of 2)
• In the area of cyber resilience, the EC asks ENISA to:
– Assist the Member States in developing strong national
cyber resilience capabilities.
– Examine in 2013 the feasibility of Computer Security
Incident Response Team(s) for Industrial Control
Systems (ICS-CSIRTs) for the EU.
– Continue supporting the Member States and the EU
institutions in carrying out regular pan-European cyber
incident exercises.
European Union Agency for Network and Information Security www.enisa.europa.eu 9
Achieving Cyber Resilience (2 of 2)
• Specifically in terms of raising awareness, the Commission
asks ENISA to:
– Propose in 2013 a roadmap for a "Network and
Information Security driving licence".
– Support a cybersecurity championship in 2014, where
university students will compete in proposing NIS
solutions.
European Union Agency for Network and Information Security www.enisa.europa.eu 10
European Cybersecurity Month 2013
http://cybersecuritymonth.eu/
European Union Agency for Network and Information Security www.enisa.europa.eu 11
Developing Resources
• There is a risk that Europe becomes excessively dependent
on ICT and on security solutions developed outside its
frontiers.
• Hardware and software components used in critical
services and infrastructure must be trustworthy, secure
and guarantee the protection of personal data.
• In order to mitigate this risk, the strategy proposes two
action areas:
– Promoting a Single Market for cybersecurity products
– Fostering R&D investments and innovation
European Union Agency for Network and Information Security www.enisa.europa.eu 12
Single Market for Products
• A high level of security can only be ensured if all in the
value chain make security a priority.
• The strategy aims to increase cooperation and
transparency about security in ICT products:
– It calls for the establishment of a platform to identify
good cybersecurity practices across the value chain.
• COM will support the development of security standards
and assist with EU-wide voluntary certification schemes.
– Cloud computing and data protection.
– critical economic sectors - Industrial Control Systems,
energy and transport infrastructure.
European Union Agency for Network and Information Security www.enisa.europa.eu 13
R&D and Innovation
• R&D should fill technology gaps in ICT security and prepare
for the next generation of security.
• The Horizon 2020 Framework Programme for Research and
Innovation will be launched in 2014:
– There are specific objectives for trustworthy ICT as well
as for combating cyber-crime.
• Specific attention will be drawn at EU level to optimising
and better coordinating various funding programmes
European Union Agency for Network and Information Security www.enisa.europa.eu 14
Developing Resources
• The Commission asks ENISA to:
– Develop, in cooperation with relevant stakeholders,
technical guidelines and recommendations for the
adoption of NIS standards and good practices in the
public and private sectors.
– Collaborate with Europol to identify emerging trends
and needs in view of evolving cybercrime and
cybersecurity patterns so as to develop adequate digital
forensic tools and technologies.
European Union Agency for Network and Information Security www.enisa.europa.eu 15
Further Involvement of ENISA
• Although ENISA is not explicitly mentioned in the other
strategic priorities, there is clearly a role for the Agency.
• The EU Internal Security Strategy explains how ENISA
should collaborate with the recently established EU Cyber
Crime Centre.
• We have a role in creating a strong culture of NIS
throughout the EU.
• This can only be achieved by bringing communities
together and ensuring that information on NIS is shared
between such communities in an appropriate manner.
European Union Agency for Network and Information Security www.enisa.europa.eu 16
Concluding Remarks
• Complex ICT systems keep our economies running in key sectors
such as finance, health, energy, etc.
• Many business models are built on the uninterrupted availability
of the Internet and the smooth functioning of information
systems
• EC Recognises the importance of ICT in contributing to EUs
economic growth and its role as a critical resource for all
economic sectors
• ENISA is already well established and
contributing in many of the areas
described in the EU proposal for an
EU cybersecurity strategy.
www.enisa.europa.eu
Follow ENISA:
European Union Agency for Network and Information Security
Thank you.
Graeme Cooper, Head of Public Affairs Unit, ENISA
ENISA
European Union Agency for Network and Information Security
Science and Technology Park of Crete (ITE)
Vassilika Vouton, 700 13, Heraklion, Greece
Athens Office
1 Vass. Sofias & Meg. Alexandrou
Marousi 151 24, Athens, Greece

More Related Content

What's hot

Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Emmanuel Mumuni
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
Deutsche Telekom AG
 
Summer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on securitySummer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on security
Nikolaos Georgitsopoulos
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARIUS EUGEN OPRAN
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIESEIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
Δρ. Γιώργος K. Κασάπης
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
Benjamin Ang
 
Dataistheborder
DataistheborderDataistheborder
Dataistheborder
burmaball
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Benjamin Ang
 

What's hot (15)

Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
 
Summer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on securitySummer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on security
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OK
 
Steve Purser
Steve Purser Steve Purser
Steve Purser
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Cybersecurity nl
Cybersecurity nlCybersecurity nl
Cybersecurity nl
 
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIESEIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 
Dataistheborder
DataistheborderDataistheborder
Dataistheborder
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 

Similar to European priorities in information security

SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
BigData_Europe
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
David Sweigert
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
EUBrasilCloudFORUM .
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
European Data Forum
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
Antoine Vigneron
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
Andrey Apuhtin
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
Andrey Apuhtin
 
Granada declaration - European Digital Agenda
Granada declaration - European Digital AgendaGranada declaration - European Digital Agenda
Granada declaration - European Digital Agenda
European e-Business Lab
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
Kevin Duffey
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
DATA SECURITY SOLUTIONS
 
Digital single market
Digital single marketDigital single market
Digital single market
Kyiv National Economic University
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
Digital europeprogram2021 2027
Digital europeprogram2021 2027Digital europeprogram2021 2027
Digital europeprogram2021 2027
Simone Torrente
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
BigData_Europe
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
CYBERWISER .eu
 
Enisa and cyber security standards
Enisa and cyber security standardsEnisa and cyber security standards
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Sandro D'Elia
 

Similar to European priorities in information security (20)

SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
 
Granada declaration - European Digital Agenda
Granada declaration - European Digital AgendaGranada declaration - European Digital Agenda
Granada declaration - European Digital Agenda
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
Digital single market
Digital single marketDigital single market
Digital single market
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
Dantemtc a rouby_european_policies
Dantemtc a rouby_european_policiesDantemtc a rouby_european_policies
Dantemtc a rouby_european_policies
 
Digital europeprogram2021 2027
Digital europeprogram2021 2027Digital europeprogram2021 2027
Digital europeprogram2021 2027
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
Enisa and cyber security standards
Enisa and cyber security standardsEnisa and cyber security standards
Enisa and cyber security standards
 
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
 

More from European Union Agency for Network and Information Security (ENISA)

The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
European Union Agency for Network and Information Security (ENISA)
 
Power Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications SectorPower Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications Sector
European Union Agency for Network and Information Security (ENISA)
 
Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System
European Union Agency for Network and Information Security (ENISA)
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
European Union Agency for Network and Information Security (ENISA)
 
Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management
European Union Agency for Network and Information Security (ENISA)
 
Enisa internet mapping project-20130523
Enisa internet mapping project-20130523Enisa internet mapping project-20130523

More from European Union Agency for Network and Information Security (ENISA) (6)

The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Power Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications SectorPower Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications Sector
 
Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
 
Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management
 
Enisa internet mapping project-20130523
Enisa internet mapping project-20130523Enisa internet mapping project-20130523
Enisa internet mapping project-20130523
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

European priorities in information security

  • 1. European Union Agency for Network and Information Security www.enisa.europa.eu European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
  • 2. European Union Agency for Network and Information Security www.enisa.europa.eu 2 EU Cubersecurity Strategy - essential points “An Open, Safe and Secure Cyberspace” • The norms, principles and values that the EU upholds offline, should also apply online. • Cyberspace must be correctly protected: – Governments have a significant role in ensuring a free and safe cyberspace. – The private sector owns and operates significant parts of cyberspace and has a leading role. • Outside the EU, governments may misuse cyberspace for surveillance and control. – The EU can counter this situation by promoting freedom online and ensuring respect of fundamental rights online.
  • 3. European Union Agency for Network and Information Security www.enisa.europa.eu 3 Economic Arguments • By completing the Digital Single Market, Europe could boost its GDP by almost €500 billion a year. • For new connected technologies to take off citizens will need trust and confidence. – Currently, Europeans are not confident in their ability to use the Internet for banking or purchases. – They are also reluctant to disclose personal information. – Across the EU, more than one in ten Internet users has been a victim of online fraud. • The EU economy is already affected by cybercrime activities, economic espionage and state-sponsored activities are new threats.
  • 4. European Union Agency for Network and Information Security www.enisa.europa.eu 4 The Principles • The strategy proposes key principles to guide the EU and international approach: – The EU's core values apply as much in the digital as in the physical world. – Fundamental rights, freedom of expression, personal data and privacy should be protected. – The Internet should be accessible to all citizens. – The digital world must be subject to democratic and efficient multi-stakeholder governance. – Ensuring security is a shared responsibility.
  • 5. European Union Agency for Network and Information Security www.enisa.europa.eu 5 Strategic Priorities • The Five strategic objectives of the strategy are as follows: – Achieving cyber resilience – Drastically reducing cybercrime – Developing cyberdefence policy and capabilities related to the Common Security and Defence Policy (CSDP) – Developing the industrial and technological resources for cybersecurity – Establishing a coherent international cyberspace policy for the European Union and promoting core EU values ENISA explicitly called upon.
  • 6. European Union Agency for Network and Information Security www.enisa.europa.eu 6 Achieving Cyber Resilience • Introduces ENISA and explains the policy on NIS. • Makes reference to articles 13a & 13b. • Introduces the legislative proposal. • Stresses the importance of the following: – The establishment of a cybersecurity culture to enhance business opportunities and competitiveness. – Reporting significant incidents to the national NIS competent authorities. – Exchange of information between National NIS competent authorities and other regulatory bodies. – Recognises that exercises at EU level are essential to stimulate cooperation among the MS and the private sector.
  • 7. European Union Agency for Network and Information Security www.enisa.europa.eu 7 The Legislative Proposal • Key points: – Will help establish common minimum requirements for NIS at national level. – Requires Member States to designate national competent authorities for NIS, set up a competent CERT and adopt a national NIS strategy and a national NIS cooperation plan. – Explains the role of the CERT EU regarding the EU institutions, agencies and bodies. – Requires the establishment of coordinated prevention, detection, mitigation and response mechanisms. – Requires the private sector to develop, at a technical level, its own cyber resilience capacities and share best practices across sectors.
  • 8. European Union Agency for Network and Information Security www.enisa.europa.eu 8 Achieving Cyber Resilience (1 of 2) • In the area of cyber resilience, the EC asks ENISA to: – Assist the Member States in developing strong national cyber resilience capabilities. – Examine in 2013 the feasibility of Computer Security Incident Response Team(s) for Industrial Control Systems (ICS-CSIRTs) for the EU. – Continue supporting the Member States and the EU institutions in carrying out regular pan-European cyber incident exercises.
  • 9. European Union Agency for Network and Information Security www.enisa.europa.eu 9 Achieving Cyber Resilience (2 of 2) • Specifically in terms of raising awareness, the Commission asks ENISA to: – Propose in 2013 a roadmap for a "Network and Information Security driving licence". – Support a cybersecurity championship in 2014, where university students will compete in proposing NIS solutions.
  • 10. European Union Agency for Network and Information Security www.enisa.europa.eu 10 European Cybersecurity Month 2013 http://cybersecuritymonth.eu/
  • 11. European Union Agency for Network and Information Security www.enisa.europa.eu 11 Developing Resources • There is a risk that Europe becomes excessively dependent on ICT and on security solutions developed outside its frontiers. • Hardware and software components used in critical services and infrastructure must be trustworthy, secure and guarantee the protection of personal data. • In order to mitigate this risk, the strategy proposes two action areas: – Promoting a Single Market for cybersecurity products – Fostering R&D investments and innovation
  • 12. European Union Agency for Network and Information Security www.enisa.europa.eu 12 Single Market for Products • A high level of security can only be ensured if all in the value chain make security a priority. • The strategy aims to increase cooperation and transparency about security in ICT products: – It calls for the establishment of a platform to identify good cybersecurity practices across the value chain. • COM will support the development of security standards and assist with EU-wide voluntary certification schemes. – Cloud computing and data protection. – critical economic sectors - Industrial Control Systems, energy and transport infrastructure.
  • 13. European Union Agency for Network and Information Security www.enisa.europa.eu 13 R&D and Innovation • R&D should fill technology gaps in ICT security and prepare for the next generation of security. • The Horizon 2020 Framework Programme for Research and Innovation will be launched in 2014: – There are specific objectives for trustworthy ICT as well as for combating cyber-crime. • Specific attention will be drawn at EU level to optimising and better coordinating various funding programmes
  • 14. European Union Agency for Network and Information Security www.enisa.europa.eu 14 Developing Resources • The Commission asks ENISA to: – Develop, in cooperation with relevant stakeholders, technical guidelines and recommendations for the adoption of NIS standards and good practices in the public and private sectors. – Collaborate with Europol to identify emerging trends and needs in view of evolving cybercrime and cybersecurity patterns so as to develop adequate digital forensic tools and technologies.
  • 15. European Union Agency for Network and Information Security www.enisa.europa.eu 15 Further Involvement of ENISA • Although ENISA is not explicitly mentioned in the other strategic priorities, there is clearly a role for the Agency. • The EU Internal Security Strategy explains how ENISA should collaborate with the recently established EU Cyber Crime Centre. • We have a role in creating a strong culture of NIS throughout the EU. • This can only be achieved by bringing communities together and ensuring that information on NIS is shared between such communities in an appropriate manner.
  • 16. European Union Agency for Network and Information Security www.enisa.europa.eu 16 Concluding Remarks • Complex ICT systems keep our economies running in key sectors such as finance, health, energy, etc. • Many business models are built on the uninterrupted availability of the Internet and the smooth functioning of information systems • EC Recognises the importance of ICT in contributing to EUs economic growth and its role as a critical resource for all economic sectors • ENISA is already well established and contributing in many of the areas described in the EU proposal for an EU cybersecurity strategy.
  • 17. www.enisa.europa.eu Follow ENISA: European Union Agency for Network and Information Security Thank you. Graeme Cooper, Head of Public Affairs Unit, ENISA ENISA European Union Agency for Network and Information Security Science and Technology Park of Crete (ITE) Vassilika Vouton, 700 13, Heraklion, Greece Athens Office 1 Vass. Sofias & Meg. Alexandrou Marousi 151 24, Athens, Greece