SlideShare a Scribd company logo
The NIS
Directive
Yet another expensive
legality or an
opportunity to
improve security?
Welcome
Rayna Stamboliyska
Security and Compliance
(risk & crisis management)
Author, “La face cachée d’Internet”
(Prix du livre cyber “Grand public”,
FIC 2018)
rayna@rs-strategy.consulting
@MaliciaRogue
What is the NIS Directive?
The Network and Information Security Directive aims to:
◉ Ensure strong common security standards across the EU;
◉ Improve IS and network governance & security;
◉ Strengthen defense and resilience.
=> the cybersecurity arm of the Digital Single Market
What must Member States do?
Create institutions
dedicated to
cybersecurity
Develop inter-CSIRT
collaboration
Identify and lead
concerned orgs to
compliance with NIS
Ensure organisations
remain compliant with
NIS
NB: Some orgs are excluded (unnecessary to cumulate legal obligations),
e.g. electronic comms, eIDAS-concerned, French “OIV”, etc.
Is my organisation concerned?
YES if you are in one of those industries:
Essential Services Digital Services
The road to compliance
Albeit vague, the NIS Directive insists on:
◉ Identify and master: risk management;
◉ Map, audit and get official approval: implement security;
◉ Compartiment, filter, implement IAM: consolidate architecture;
◉ Monitor, detect and fix: maintain security;
=> all that’s common sense… or is it a necessary evil?
Some lessons learnt
Finding forerunners where you’d expect them the least
State of cybersecurity at many vital service providers
Allegory.
“Loi de Programmation militaire” (since 2013)
◉ Legislative vehicle for security at vital services providers
◉ Articulated in 20 rules with varying compliance timelines;
◉ Defines “SIIV”: declaration-based perimeters;
◉ Governance, audit & official approval are a thing;
◉ Incident management becomes of vital importance (PDIS, PRIS);
◉ Parallelise & build upon existing expertise despite office politics.
=> ROI & all-encompassing compliance approach
Remember: Security is a risky business
◉ Timelines may exert pressure;
◉ What if legislation is slow to come by?
◉ Adjusting expectations might cost you
greatly;
◉ Harmony is real hard: a unique EU-wide
reference institution? Critical & sensitive
intel sharing?
Threat modelling is the new black
The intimate knowledge of your systems, tools and their
becoming, both technical and functional, is crucial:
Weigh in and structure your strategy.
Thanks!
Rayna Stamboliyska
Security and Compliance
(risk & crisis management)
Author, “La face cachée d’Internet”
(Prix du livre cyber “Grand public”,
FIC 2018)
rayna@rs-strategy.consulting
@MaliciaRogue

More Related Content

What's hot

Crypto Valley at the OECD Workshop on Digital Financial Assets
Crypto Valley at the OECD Workshop on Digital Financial Assets Crypto Valley at the OECD Workshop on Digital Financial Assets
Crypto Valley at the OECD Workshop on Digital Financial Assets
OECD Directorate for Financial and Enterprise Affairs
 
Etherisc at Ethereum London meetup
Etherisc at Ethereum London meetupEtherisc at Ethereum London meetup
Etherisc at Ethereum London meetup
Stephan Karpischek
 
Witt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama PanalWitt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama Panal
bcilondonforum
 
BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...
BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...
BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...
R3
 
Indjic Fintech Module 7
Indjic Fintech Module 7Indjic Fintech Module 7
Indjic Fintech Module 7
Drago Indjic
 
DWI Mobile Financial Solutions
DWI Mobile Financial SolutionsDWI Mobile Financial Solutions
DWI Mobile Financial Solutions
Daniel Wamara
 
Where are we going? DLT & Blockchain Legal
Where are we going? DLT & Blockchain Legal Where are we going? DLT & Blockchain Legal
Where are we going? DLT & Blockchain Legal
Philip Vasquez
 
Risk and Insurance Management Society
Risk and Insurance Management SocietyRisk and Insurance Management Society
Risk and Insurance Management SocietyAlan Reisch
 
Avida International, Who We Are
Avida International, Who We AreAvida International, Who We Are
Avida International, Who We Are
JeroenSch
 
Etherisc Ethereum DEV NL meetup
Etherisc Ethereum DEV NL meetupEtherisc Ethereum DEV NL meetup
Etherisc Ethereum DEV NL meetup
Stephan Karpischek
 
Asia 2017 Conference Reviews - The Digital Insurance Customer
Asia 2017 Conference Reviews - The Digital Insurance CustomerAsia 2017 Conference Reviews - The Digital Insurance Customer
Asia 2017 Conference Reviews - The Digital Insurance Customer
The Digital Insurer
 
EXECInsurtech Review
EXECInsurtech ReviewEXECInsurtech Review
EXECInsurtech Review
The Digital Insurer
 
Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...
Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...
Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...
FinTech Belgium
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
JISC.AM
 
Investment promotion and access to markets: new opportunity?
Investment promotion and access to markets: new opportunity?Investment promotion and access to markets: new opportunity?
Investment promotion and access to markets: new opportunity?
OECDglobal
 
KiidLine: Distribute Your Funds and Gain Visibility
KiidLine: Distribute Your Funds and Gain VisibilityKiidLine: Distribute Your Funds and Gain Visibility
KiidLine: Distribute Your Funds and Gain Visibility
Arnaud
 
Using intellectual property in forming strategic global alliances
Using intellectual property in forming strategic global alliances Using intellectual property in forming strategic global alliances
Using intellectual property in forming strategic global alliances
Global Outsourcing Association of Lawyers (GOAL)
 
MRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODO
MRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODOMRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODO
MRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODO
associate14
 
ICO: doing it right
ICO: doing it rightICO: doing it right
ICO: doing it right
Mukhtar Mussabetov
 

What's hot (19)

Crypto Valley at the OECD Workshop on Digital Financial Assets
Crypto Valley at the OECD Workshop on Digital Financial Assets Crypto Valley at the OECD Workshop on Digital Financial Assets
Crypto Valley at the OECD Workshop on Digital Financial Assets
 
Etherisc at Ethereum London meetup
Etherisc at Ethereum London meetupEtherisc at Ethereum London meetup
Etherisc at Ethereum London meetup
 
Witt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama PanalWitt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama Panal
 
BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...
BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...
BizDay: LenderComm: Collaborative Innovation & DLT in Syndicated Lending, Hel...
 
Indjic Fintech Module 7
Indjic Fintech Module 7Indjic Fintech Module 7
Indjic Fintech Module 7
 
DWI Mobile Financial Solutions
DWI Mobile Financial SolutionsDWI Mobile Financial Solutions
DWI Mobile Financial Solutions
 
Where are we going? DLT & Blockchain Legal
Where are we going? DLT & Blockchain Legal Where are we going? DLT & Blockchain Legal
Where are we going? DLT & Blockchain Legal
 
Risk and Insurance Management Society
Risk and Insurance Management SocietyRisk and Insurance Management Society
Risk and Insurance Management Society
 
Avida International, Who We Are
Avida International, Who We AreAvida International, Who We Are
Avida International, Who We Are
 
Etherisc Ethereum DEV NL meetup
Etherisc Ethereum DEV NL meetupEtherisc Ethereum DEV NL meetup
Etherisc Ethereum DEV NL meetup
 
Asia 2017 Conference Reviews - The Digital Insurance Customer
Asia 2017 Conference Reviews - The Digital Insurance CustomerAsia 2017 Conference Reviews - The Digital Insurance Customer
Asia 2017 Conference Reviews - The Digital Insurance Customer
 
EXECInsurtech Review
EXECInsurtech ReviewEXECInsurtech Review
EXECInsurtech Review
 
Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...
Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...
Getting value out of the blockchain by Olivier Roucloux - FinTech Belgium Sum...
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Investment promotion and access to markets: new opportunity?
Investment promotion and access to markets: new opportunity?Investment promotion and access to markets: new opportunity?
Investment promotion and access to markets: new opportunity?
 
KiidLine: Distribute Your Funds and Gain Visibility
KiidLine: Distribute Your Funds and Gain VisibilityKiidLine: Distribute Your Funds and Gain Visibility
KiidLine: Distribute Your Funds and Gain Visibility
 
Using intellectual property in forming strategic global alliances
Using intellectual property in forming strategic global alliances Using intellectual property in forming strategic global alliances
Using intellectual property in forming strategic global alliances
 
MRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODO
MRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODOMRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODO
MRHB DeFi Launches IDO, Followed by Listing of $MRHB on PancakeSwap and DODO
 
ICO: doing it right
ICO: doing it rightICO: doing it right
ICO: doing it right
 

Similar to The NIS directive: Yet another expensive legality or an opportunity to improve security?

Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
ebuc
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
Omer Coskun
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
David Crozier
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
Team Finland Future Watch
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
NRBsanv
 
Next Wave of Fintech: Redefining Financial Services through Technology
Next Wave of Fintech: Redefining Financial Services through TechnologyNext Wave of Fintech: Redefining Financial Services through Technology
Next Wave of Fintech: Redefining Financial Services through Technology
Robin Teigland
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
FERMA
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
Mestizo Enterprises
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
ShivamSharma909
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
NOAH Advisors
 
How Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond KairouzHow Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond Kairouz
sigortatatbikatcilari
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
Matthew Rosenquist
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 

Similar to The NIS directive: Yet another expensive legality or an opportunity to improve security? (20)

Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Next Wave of Fintech: Redefining Financial Services through Technology
Next Wave of Fintech: Redefining Financial Services through TechnologyNext Wave of Fintech: Redefining Financial Services through Technology
Next Wave of Fintech: Redefining Financial Services through Technology
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
 
How Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond KairouzHow Technology Impacts the Insurance Sector - Raymond Kairouz
How Technology Impacts the Insurance Sector - Raymond Kairouz
 
CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 

More from Rayna Stamboliyska

#CoRIIN2018 : Comment ne pas communiquer en temps de crise
#CoRIIN2018 : Comment ne pas communiquer en temps de crise#CoRIIN2018 : Comment ne pas communiquer en temps de crise
#CoRIIN2018 : Comment ne pas communiquer en temps de crise
Rayna Stamboliyska
 
Références bibliographiques "La face cachée d'Internet"
Références bibliographiques "La face cachée d'Internet"Références bibliographiques "La face cachée d'Internet"
Références bibliographiques "La face cachée d'Internet"
Rayna Stamboliyska
 
La question de mémoire collective post-conflictuelle : une comparaison des di...
La question de mémoire collective post-conflictuelle : une comparaison des di...La question de mémoire collective post-conflictuelle : une comparaison des di...
La question de mémoire collective post-conflictuelle : une comparaison des di...
Rayna Stamboliyska
 
The role of data for economic prosperity in the Middle East and North Africa
The role of data for economic prosperity in the Middle East and North AfricaThe role of data for economic prosperity in the Middle East and North Africa
The role of data for economic prosperity in the Middle East and North Africa
Rayna Stamboliyska
 
ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)
ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)
ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)
Rayna Stamboliyska
 
Let's talk about policy! Politiques publiques pour l’ouverture des données sc...
Let's talk about policy! Politiques publiques pour l’ouverture des données sc...Let's talk about policy! Politiques publiques pour l’ouverture des données sc...
Let's talk about policy! Politiques publiques pour l’ouverture des données sc...
Rayna Stamboliyska
 
Open Data Barometer, 2nd edition
Open Data Barometer, 2nd editionOpen Data Barometer, 2nd edition
Open Data Barometer, 2nd edition
Rayna Stamboliyska
 
Egypt: News Websites and Alternative Voices
Egypt: News Websites and Alternative VoicesEgypt: News Websites and Alternative Voices
Egypt: News Websites and Alternative Voices
Rayna Stamboliyska
 
Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015
Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015
Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015
Rayna Stamboliyska
 
Corruption risk management
Corruption risk managementCorruption risk management
Corruption risk management
Rayna Stamboliyska
 
Открытые данные для социально- экономического развития: Роль гражданского общ...
Открытые данные для социально- экономического развития: Роль гражданского общ...Открытые данные для социально- экономического развития: Роль гражданского общ...
Открытые данные для социально- экономического развития: Роль гражданского общ...
Rayna Stamboliyska
 
#OpenDataKG: Open Data and the role of civil society
#OpenDataKG: Open Data and the role of civil society#OpenDataKG: Open Data and the role of civil society
#OpenDataKG: Open Data and the role of civil society
Rayna Stamboliyska
 
Programme BIL:OpenGov Tunisie (21 juin 2014)
Programme BIL:OpenGov Tunisie (21 juin 2014)Programme BIL:OpenGov Tunisie (21 juin 2014)
Programme BIL:OpenGov Tunisie (21 juin 2014)
Rayna Stamboliyska
 
Cours pour la Licence "Sciences et Ingéniérie" ENSTA
Cours pour la Licence "Sciences et Ingéniérie" ENSTACours pour la Licence "Sciences et Ingéniérie" ENSTA
Cours pour la Licence "Sciences et Ingéniérie" ENSTARayna Stamboliyska
 
Gendered Quantified Self: my talk at FLOSSIE 2013
Gendered Quantified Self: my talk at FLOSSIE 2013Gendered Quantified Self: my talk at FLOSSIE 2013
Gendered Quantified Self: my talk at FLOSSIE 2013Rayna Stamboliyska
 
Big data, bad data -- Closing keynote at the Open World Forum 2013
Big data, bad data -- Closing keynote at the Open World Forum 2013Big data, bad data -- Closing keynote at the Open World Forum 2013
Big data, bad data -- Closing keynote at the Open World Forum 2013
Rayna Stamboliyska
 
Open Data in Science & Research -- Open World Forum 2013, Public Policies track
Open Data in Science & Research -- Open World Forum 2013, Public Policies trackOpen Data in Science & Research -- Open World Forum 2013, Public Policies track
Open Data in Science & Research -- Open World Forum 2013, Public Policies track
Rayna Stamboliyska
 
Knowledge Adventures for Kids: Masterclass presentation during the Social Med...
Knowledge Adventures for Kids: Masterclass presentation during the Social Med...Knowledge Adventures for Kids: Masterclass presentation during the Social Med...
Knowledge Adventures for Kids: Masterclass presentation during the Social Med...
Rayna Stamboliyska
 
NASA SpaceApps challenges: Paris Off-the-Grid restitution
NASA SpaceApps challenges: Paris Off-the-Grid restitutionNASA SpaceApps challenges: Paris Off-the-Grid restitution
NASA SpaceApps challenges: Paris Off-the-Grid restitutionRayna Stamboliyska
 
Free software community functioning
Free software community functioningFree software community functioning
Free software community functioningRayna Stamboliyska
 

More from Rayna Stamboliyska (20)

#CoRIIN2018 : Comment ne pas communiquer en temps de crise
#CoRIIN2018 : Comment ne pas communiquer en temps de crise#CoRIIN2018 : Comment ne pas communiquer en temps de crise
#CoRIIN2018 : Comment ne pas communiquer en temps de crise
 
Références bibliographiques "La face cachée d'Internet"
Références bibliographiques "La face cachée d'Internet"Références bibliographiques "La face cachée d'Internet"
Références bibliographiques "La face cachée d'Internet"
 
La question de mémoire collective post-conflictuelle : une comparaison des di...
La question de mémoire collective post-conflictuelle : une comparaison des di...La question de mémoire collective post-conflictuelle : une comparaison des di...
La question de mémoire collective post-conflictuelle : une comparaison des di...
 
The role of data for economic prosperity in the Middle East and North Africa
The role of data for economic prosperity in the Middle East and North AfricaThe role of data for economic prosperity in the Middle East and North Africa
The role of data for economic prosperity in the Middle East and North Africa
 
ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)
ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)
ОТВОРЕНИ ДАННИ ЗА ДОБРО УПРАВЛЕНИЕ (Open Data for Good Governance)
 
Let's talk about policy! Politiques publiques pour l’ouverture des données sc...
Let's talk about policy! Politiques publiques pour l’ouverture des données sc...Let's talk about policy! Politiques publiques pour l’ouverture des données sc...
Let's talk about policy! Politiques publiques pour l’ouverture des données sc...
 
Open Data Barometer, 2nd edition
Open Data Barometer, 2nd editionOpen Data Barometer, 2nd edition
Open Data Barometer, 2nd edition
 
Egypt: News Websites and Alternative Voices
Egypt: News Websites and Alternative VoicesEgypt: News Websites and Alternative Voices
Egypt: News Websites and Alternative Voices
 
Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015
Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015
Contes et légendes du RuNet : séminaire EHESS du 16 mars 2015
 
Corruption risk management
Corruption risk managementCorruption risk management
Corruption risk management
 
Открытые данные для социально- экономического развития: Роль гражданского общ...
Открытые данные для социально- экономического развития: Роль гражданского общ...Открытые данные для социально- экономического развития: Роль гражданского общ...
Открытые данные для социально- экономического развития: Роль гражданского общ...
 
#OpenDataKG: Open Data and the role of civil society
#OpenDataKG: Open Data and the role of civil society#OpenDataKG: Open Data and the role of civil society
#OpenDataKG: Open Data and the role of civil society
 
Programme BIL:OpenGov Tunisie (21 juin 2014)
Programme BIL:OpenGov Tunisie (21 juin 2014)Programme BIL:OpenGov Tunisie (21 juin 2014)
Programme BIL:OpenGov Tunisie (21 juin 2014)
 
Cours pour la Licence "Sciences et Ingéniérie" ENSTA
Cours pour la Licence "Sciences et Ingéniérie" ENSTACours pour la Licence "Sciences et Ingéniérie" ENSTA
Cours pour la Licence "Sciences et Ingéniérie" ENSTA
 
Gendered Quantified Self: my talk at FLOSSIE 2013
Gendered Quantified Self: my talk at FLOSSIE 2013Gendered Quantified Self: my talk at FLOSSIE 2013
Gendered Quantified Self: my talk at FLOSSIE 2013
 
Big data, bad data -- Closing keynote at the Open World Forum 2013
Big data, bad data -- Closing keynote at the Open World Forum 2013Big data, bad data -- Closing keynote at the Open World Forum 2013
Big data, bad data -- Closing keynote at the Open World Forum 2013
 
Open Data in Science & Research -- Open World Forum 2013, Public Policies track
Open Data in Science & Research -- Open World Forum 2013, Public Policies trackOpen Data in Science & Research -- Open World Forum 2013, Public Policies track
Open Data in Science & Research -- Open World Forum 2013, Public Policies track
 
Knowledge Adventures for Kids: Masterclass presentation during the Social Med...
Knowledge Adventures for Kids: Masterclass presentation during the Social Med...Knowledge Adventures for Kids: Masterclass presentation during the Social Med...
Knowledge Adventures for Kids: Masterclass presentation during the Social Med...
 
NASA SpaceApps challenges: Paris Off-the-Grid restitution
NASA SpaceApps challenges: Paris Off-the-Grid restitutionNASA SpaceApps challenges: Paris Off-the-Grid restitution
NASA SpaceApps challenges: Paris Off-the-Grid restitution
 
Free software community functioning
Free software community functioningFree software community functioning
Free software community functioning
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

The NIS directive: Yet another expensive legality or an opportunity to improve security?

  • 1. The NIS Directive Yet another expensive legality or an opportunity to improve security?
  • 2. Welcome Rayna Stamboliyska Security and Compliance (risk & crisis management) Author, “La face cachée d’Internet” (Prix du livre cyber “Grand public”, FIC 2018) rayna@rs-strategy.consulting @MaliciaRogue
  • 3. What is the NIS Directive? The Network and Information Security Directive aims to: ◉ Ensure strong common security standards across the EU; ◉ Improve IS and network governance & security; ◉ Strengthen defense and resilience. => the cybersecurity arm of the Digital Single Market
  • 4. What must Member States do? Create institutions dedicated to cybersecurity Develop inter-CSIRT collaboration Identify and lead concerned orgs to compliance with NIS Ensure organisations remain compliant with NIS NB: Some orgs are excluded (unnecessary to cumulate legal obligations), e.g. electronic comms, eIDAS-concerned, French “OIV”, etc.
  • 5. Is my organisation concerned? YES if you are in one of those industries: Essential Services Digital Services
  • 6. The road to compliance Albeit vague, the NIS Directive insists on: ◉ Identify and master: risk management; ◉ Map, audit and get official approval: implement security; ◉ Compartiment, filter, implement IAM: consolidate architecture; ◉ Monitor, detect and fix: maintain security; => all that’s common sense… or is it a necessary evil?
  • 7. Some lessons learnt Finding forerunners where you’d expect them the least
  • 8. State of cybersecurity at many vital service providers Allegory.
  • 9. “Loi de Programmation militaire” (since 2013) ◉ Legislative vehicle for security at vital services providers ◉ Articulated in 20 rules with varying compliance timelines; ◉ Defines “SIIV”: declaration-based perimeters; ◉ Governance, audit & official approval are a thing; ◉ Incident management becomes of vital importance (PDIS, PRIS); ◉ Parallelise & build upon existing expertise despite office politics. => ROI & all-encompassing compliance approach
  • 10. Remember: Security is a risky business ◉ Timelines may exert pressure; ◉ What if legislation is slow to come by? ◉ Adjusting expectations might cost you greatly; ◉ Harmony is real hard: a unique EU-wide reference institution? Critical & sensitive intel sharing?
  • 11. Threat modelling is the new black The intimate knowledge of your systems, tools and their becoming, both technical and functional, is crucial: Weigh in and structure your strategy.
  • 12. Thanks! Rayna Stamboliyska Security and Compliance (risk & crisis management) Author, “La face cachée d’Internet” (Prix du livre cyber “Grand public”, FIC 2018) rayna@rs-strategy.consulting @MaliciaRogue

Editor's Notes

  1. Add icons