The Institute of International and European Affairs 8 North Great Georges Street, Dublin 1, Ireland

Size: px
Start display at page:

Download "The Institute of International and European Affairs 8 North Great Georges Street, Dublin 1, Ireland"

Transcription

1

2 The Institute of International and European Affairs 8 North Great Georges Street, Dublin 1, Ireland Tel: (353) : Fax: (353) reception@iiea.com Cybersecurity: European and domestic responses. April 2013, The Institute of International and European Affairs. The Institute of International and European Affairs grants permission for the reproduction of quotations from this text provided such quotations do not exceed 400 words in length, that they provide the reader with a fair context, and that due acknowledgment of the source is made. As an independent forum, the Institute of International and European Affairs does not express opinions of its own. The views expressed in its publications are solely the responsibility of the authors. Cover designed by Andrew Hegarty, Creative Officer, IIEA Photo by flaviokola,

3 Cybersecurity: European and domestic responses Briefing paper Abstract: This paper provides an overview of the EU s recent legislative proposals on cybersecurity, and examines the evolving role of each of the key European stakeholders in this field. It proceeds to summarise Ireland s current legislative and policy responses to cyber-threats, before outlining the major policy challenges to EU proposals in the medium term.

4 1. EU Cybersecurity Strategy and Proposed Directive on Network and Information Security, 7 February 2013 On 7 February 2013, the European Commission proposed a wide-ranging EU cybersecurity strategy ( An Open, Safe and Secure Cyber-space ) and Directive on Network and Information Security. The proposal was jointly launched by the Commissioner for the Digital Agenda, Neelie Kroes; the Commissioner for Home Affairs, Cecilia Malmström; and the High Representative for Foreign Affairs and Security Policy, Catherine Ashton. The strategy and Directive seek to combat financial fraud, identity theft, child pornography, cyber-attacks and a range of other cyber-crimes and online security threats. They aim to set higher standards of protection for network and information systems, as well as seeking to address the limited levels of cooperation between Member States and EU institutions in combating cyber-crime. The Commission has underlined five key strategic priorities for the proposed reforms: Achieving cyber-resilience Reducing cyber-crime Developing cyber-defence policy and capabilities related to the Common Security and Defence Policy (CSDP) Developing the industrial and technological resources for cybersecurity Establishing a coherent international cyber-space policy for the EU and promoting core EU values 1 The proposed legislation has significant implications for Member States, public administrations, online enterprises and operators of critical infrastructures, including energy, transport, banking, financial services and healthcare. The Directive contains the following specific provisions: Member States will be required to adopt a network and information security (NIS) strategy and designate a national competent NIS authority with adequate financial and human resources to prevent, handle and respond to NIS risks and incidents. Each Member State will also be required to set up a national Computer Emergency Response Team (CERT) responsible for handling incidents and risks, which would fall under the supervision of the competent NIS authority. 1 European Commission/EEAS Press Release: EU Cybersecurity plan to protect open internet and online freedom and opportunity, 7 February 2013, 1

5 A cooperation mechanism, comprising Member States competent NIS authorities and the Commission, is to be established to share early warnings on risks and incidents, facilitate exchange of information and best practices and organise regular peer reviews. Operators of critical infrastructures in certain sectors (financial services, transport, energy, health), enablers of information society services (notably: app stores, e- commerce platforms, Internet payment companies, cloud computing, search engines, social networks) and public administrations must adopt risk management practices and report major security incidents on their core services to the competent national NIS authority. Significantly, this requirement for market operators and public administrations to report breach notifications is to apply regardless of whether they perform the maintenance of their network and information systems internally or outsource it. Full liability for reporting, therefore, lies with market operators themselves. Market operators and public administrations will be required to undergo audits by a qualified independent body or national authority on their preparedness to handle cybersecurity threats. 2 The European Commission claims that these measures will benefit consumers, citizens, businesses and the European economy as a whole by stimulating increased confidence in digital services and online transactions. 3 In order to do so, however, the proposals must ensure that businesses are not overburdened by new reporting obligations. The UK has raised concerns that these requirements, as against a more ad hoc and voluntary information-sharing system, may have an adverse effect on business confidence. 4 Striking this delicate balance will be a key policy challenge for the EU s proposals as they are scrutinised in the coming months. On a more practical level, the proposals face a degree of time pressure. The strategy and Directive have not yet been formally distributed among the competent European Parliament committees, which are likely to include Civil Liberties, Justice and Home 2 Proposal for a Directive concerning measures to ensure a high common level of network and information security across the Union, 7 February 2013, 3 European Commission Memo: Proposed Directive on Network and Information Security frequently asked questions, 7 February 2013, 4 Maude warns on EU cybersecurity plans, Financial Times, 27 March 2013, 2

6 Affairs, Industry Research and Energy, Internal Market and Consumer Protection, and Legal Affairs. With a lead committee and rapporteurs yet to be appointed, and with European Parliament elections approaching in May 2014, it is by no means guaranteed that the proposals will be considered within the term of the current legislature. Timeline 7 February 2013: Launch of EU cybersecurity strategy and Directive on Network and Information Security April/May 2013 (tbc): May 2014: European Parliament committees to debate proposals European Parliament elections [Member States will have 18 months to transpose the Directive into national law after it is adopted by the European Parliament and Council.] 3

7 2. Key European stakeholders on cybersecurity The strategy and Directive set out important implementation roles for relevant EU agencies, a number of which have undergone or are undergoing organisational changes. Coordination among these bodies with regard to tasks and competencies represents a challenge in the implementation of any future legislative reform in this area. European Network and Information Security Agency (ENISA) ENISA commenced operations in September 2005, having been established by a decision of the European Parliament and Council in March It has its headquarters at Heraklion in Crete, Greece and is led by Professor Udo Helmbrecht, Executive Director [Prof. Helmbrecht delivered a keynote address at the IIEA on 12 March 2013]. As a European agency, ENISA is mandated to assist the European Commission, Member States and the business community to respond to and prevent threats to network and information security. Its specific functions include: Advising and assisting the Commission and the Member States on information security and working with industry to address security-related problems in hardware and software products; Collecting and analysing data on security incidents in Europe and emerging risks; Promoting risk assessment and risk management methods to enhance capability to deal with information security threats; Awareness-raising and cooperation between different actors in the information security field, notably by developing public/private partnerships with industry. 5 In the context of the development of the EU s cybersecurity strategy and Directive, an extension of ENISA s existing mandate, which was due to expire on 13 September 2013, is currently under discussion in EU institutions and is close to final approval. The Irish Presidency reached agreement with the Council and European Parliament on a new, extended mandate for ENISA on 1 February 2013, which will aim to strengthen and modernise the agency 6 and extend its existing range of tasks. The new mandate is to last for seven years. 5 ENISA website: 6 Council of the EU Press Release: Council and European Parliament reach agreement on new mandate for the EU Network and Information Security Agency, 1 February 2013, 4

8 The European Parliament's Industry, Research and Energy (ITRE) Committee voted to approve a resolution to this effect, prepared by British MEP Giles Chichester, on 20 February The Parliament voted in full plenary to approve the resolution on 16 April The Council is due to give its final approval in the coming weeks. The updated mandate will include the following provisions: Increased financial/human resources devoted to ENISA. Strengthened governance structure, including a stronger supervisory role for ENISA s Management Board and the establishment of an executive board to ensure more accountability to the European Parliament. A clear mandate to support the establishment and functioning of an expanded European Union Computer Emergency Response Team (*CERT-EU). 7 [See below further information on CERT-EU] The establishment of an operational headquarters in Athens, with administrative functions to remain in Heraklion. *CERT-EU was established on 11 September 2012, following a successful pilot period that lasted for one year. It is mandated to maintain cybersecurity for each of the EU institutions, agencies and bodies, from which it draws its membership. The body convenes ICT security experts from the European Commission, General Secretariat of the Council, European Parliament, Committee of the Regions, and the Economic and Social Committee. It works in close cooperation with Member States national CERTs, as well as with specialised ICT security companies in the private sector. The proposed cybersecurity strategy and Directive also outline aspects of ENISA s expanded role. These include: ENISA is requested to increase its links with Europol and to reinforce links with industry stakeholders in order to identify emerging trends and responses to cyber-crime. 7 European Parliament Press Release: A new mandate for ENISA to face the challenges of network and information security in the EU, 21 February 2013, EN.pdf 5

9 The proposed cooperation mechanism between Member States on network and information security is to be developed in consultation with ENISA; the Agency could assist by developing information exchange mechanisms and templates. 8 Examine in 2013 the feasibility of Computer Security Incident Response Team(s) for Industrial Control Systems (ICS CSIRTs) for the EU. 9 Recent developments A large-scale Distributed Denial of Service (DDoS) attack was reported on 27 March 2013, in which the website of Spamhaus, a non-profit organisation which provides spamfiltering services to businesses, was targeted and brought down by huge amounts of internet traffic. The attack was strong enough to slow down internet speeds across Europe. 10 ENISA published a report of their investigation into the attack, which concludes that internet service providers should implement stronger traffic-filtering techniques. 11 In his address to the IIEA on 12 March 2013, Prof. Udo Helmbrecht, ENISA s Executive Director, underlined the added value of his Agency in fostering an environment in which network and information security is seen as a business model, rather than as an optional add-on. He also highlighted that ENISA has a key role to play in helping Member States to establish clear lines of responsibility and communication in the event of cyber attacks. ENISA published an information note on 13 March 2013, which analyses cyber-attacks launched over recent months against governments and operators of critical infrastructure. It calls on Member States and businesses to take urgent action to address 8 Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 7 February 2013, Proposal for a Directive concerning measures to ensure a high common level of network and information security across the Union, 7 February 2013, 9 Industrial Control Systems is the term applied to electronic systems that control critical infrastructures, including healthcare, energy and banking. ICS-CSIRTs are emergency response teams embedded within organisations working to combat cyber-threats to these systems. 10 Hackers mount widespread cyber attack, Financial Times, 27 March 2013, 11 ENISA Flash Note: Can Recent Attacks Really Threaten Internet Availability?, 12 April 2013, 6

10 security deficiencies, highlights the vulnerability of and existing anti-virus software and underlines the importance of preventative measures against cyber-crime. 12 European Cyber-crime Centre (EC3) EC3 was officially launched on 21 January 2013 to act as the focal point in the fight against cyber-crime in the EU. It is intended to serve as a European information hub on cyber-crime, developing and deploying digital forensic capabilities to support investigations in the EU, building capacity to combat cyber-crime through training and awareness raising, as well as delivering best practice on cyber-crime investigations. 13 On the basis of the recommendation of a Rand Corporation feasibility study commissioned by DG Home Affairs in , EC3 is hosted by Europol, the European law enforcement agency based in The Hague. It is therefore able to draw on Europol s existing infrastructure and law enforcement network. The EU s proposed cybersecurity strategy states that EC3 will gradually serve as a voice for the law enforcement community on cyber-crime issues in its own right. EC3 s mandate covers the following areas: Crimes committed by organised groups to generate large criminal profits, such as online fraud. Crimes which cause serious harm to the victim, such as online child sexual exploitation Crimes affecting critical infrastructure and information systems in the EU 15 A Letter of Intent has been signed between Europol and U.S. Immigration and Customs Enforcement (ICE) within the Department of Homeland Security, in which the two agencies committed to developing ongoing cooperative efforts through support, training, and information-sharing on different areas of cyber-crime. ICE maintains a corresponding Cyber-crime Center (C3) in Washington D.C., which comprises the Cyber-crime Unit, Child Exploitation Investigations Unit and the Computer Forensics Unit. [The IIEA briefing paper Cybersecurity: the Global Picture by Eoin McDonnell contains further information on US and other international efforts to combat cyberthreats.] 12 ENISA Flash Note: Cyber-attacks a new edge for old weapons, 13 March 2013, 13 Europol Press Release: New European Cybercrime Centre Opens at Europol, 21 January 2013, 14 Feasibility Study for a European Cybercrime Centre, RAND Corporation, 2012, 15 Europol website: 7

11 Recent developments On 28 March 2013, 44 members of a global credit card fraud network were arrested in a joint operation coordinated by the Romanian Cyber-crime Unit, in close cooperation with EC3. Illegal electronic equipment, financial data, cloned cards, and cash were seized in a series of investigations in Romania and the UK. 16 On 13 February 2013, EC3 contributed to the dismantling of a large cyber-crime network, based principally in Málaga, Spain. 17 In close cooperation with the Spanish police, 11 arrests were made of persons responsible for the creation, development and international distribution of police ransomware (malware that blocks the victim s computer, accusing him/her of having visited illegal websites and requesting the payment of a fine to unblock it). ENISA/EC3 cooperation The EU s cybersecurity strategy tasks both ENISA and EC3 to identify emerging trends and needs in view of evolving cyber-crime and cybersecurity patterns so as to develop adequate digital forensic tools and technologies. Europol hosted a workshop on October 2012 that focused on cooperation between Computer Emergency Response Teams (CERTs), as coordinated by ENISA, and law enforcement agencies, as represented by EC3. The workshop underlined the need for improved trust and coordination between the technical and law enforcement communities. It recommended measures such as the establishment of liaison roles for CERT and law enforcement representatives in each other s teams and the establishment of automated data-sharing mechanisms. 18 Other stakeholders The cybersecurity strategy requests Eurojust, the EU agency dealing with judicial cooperation in criminal matters, to identify the main obstacles to judicial cooperation on cyber-crime investigations and to coordinate between Member States and with third countries and support the investigation and prosecution of cyber-crime both at the operational and strategic level as well as training activities in the field. Eurojust is also required to cooperate closely with EC3 in order to collectively increase their effectiveness in combating cyber-crime. 16 Europol Press Release: Global Credit Card Fraud Network Dismantled, 28 March 2013, 17 Europol Press Release: Police Dismantle Prolific Ransomware Cyber-criminal Network, 13 February 2013, 18 Final Report of 7 th ENISA-CERT Workshop, 4 January 2013, 8

12 The European Police College (CEPOL) is requested to coordinate the design and planning of training courses to equip law enforcement with the knowledge and expertise to effectively tackle cyber-crime. 19 On 27 March 2013, the European Commission proposed a Regulation to merge CEPOL with Europol, relocating its training operations from the UK to Europol s headquarters in The Hague. EU inter-agency cooperation on cyber-crime: L a w enforcement; investigation; data-gathering! Cyber-crime training for law enforcement officials! Technical assistance for M e m b e r States/EU; risk assessment; data analysis! Judicial cooperation on cyber-crime investigation and prosecution! 19 Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 7 February 2013, 9

13 3. Ireland s existing activities on cybersecurity Legislative framework Ireland is a signatory to the 2001 Council of Europe Convention on Cyber-crime (the Budapest Convention ), but has yet to ratify it. The Budapest Convention is the first international treaty to provide a model for international cooperation in combating cybercrime. The new EU strategy seeks to build upon this and other existing international legal instruments, and urges Member States to ratify it as early as possible. Domestically, certain cyber-crime offences are contained in the Criminal Justice Act 1991 and the Criminal Justice (Theft and Fraud Offences) Act These acts broadly frame cyber-crime as a form of criminal damage, whereby personal data is interpreted as a form of property. 20 These acts outlaw unauthorised access to a computer, damage to personal data and dishonest operation of a computer for personal gain; forms of cyber-crime which evade these categories are arguably not covered by existing legislation (e.g. denial of service attacks). 21 With regard to data privacy, the relevant Irish law is contained in the Data Protection Acts 1988 and In line with European legislation, these acts state that personal data (both electronic and on paper) must be obtained, processed and used by data controllers fairly and for specified, explicit and legitimate purposes. The Data Protection Acts also provide for appropriate security measures to be taken against unauthorised access to, or unauthorised alteration, disclosure or destruction of, the data, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. 22 Ireland has not yet published a national cybersecurity strategy. A report published by ENISA in May 2012 notes that only ten EU Member States had published strategies at its time of writing: Estonia, Finland, Slovakia, Czech Republic, France, Germany, Lithuania, Luxembourg, the Netherlands, and the UK Criminal Justice Act 1991, 21 T.J. McIntyre, Computer Crime in Ireland: A Critical Assessment of the Substantive Law, Irish Criminal Law Journal, Vol. 15, No. 1, Data Protection (Amendment) Act 2003, 23 ENISA report: National Cyber Security Strategies: Setting the Course for National Efforts to Strengthen Security in Cyberspace, 8 May 2012, 10

14 Policing Ireland s work in combating cyber-crime is led by the Computer Crime Investigation Unit (CCIU), which sits within the Fraud Investigation Division of An Garda Síochána. CCIU employs approximately fifteen full-time staff of Detective Garda grade or higher, as well as a small number of detectives on secondment from the Paedophile Investigation Unit (PIU). CCIU provides forensic and investigative support to local policing units and has responsibility for investigating high-tech crime in Ireland. The Unit participates in an information-sharing and analysis forum with retail banks based in Ireland and internet service providers, and is in the process of developing a similar forum for telecommunications stakeholders. The Unit also acts as the point of contact for Interpol and Europol, with which it coordinates on alerts and requests for assistance. The CCIU maintains a close relationship with the Centre for Cybersecurity and Cybercrime Investigation (CCI) at University College Dublin (UCD). The two organisations have worked closely together since 1997, and are partners in European Commissionfunded projects to develop training for law enforcement officers in cyber-crime investigation and digital forensics. UCD CCI staff provide operational support and training to the CCIU. The CCIU currently sits on the board of the European Cyber-crime Training and Education Group (ECTEG). 24 Government Ireland s governmental response to cybersecurity is coordinated by the Department of Communications, Energy and Natural Resources (DCENR). DCENR works closely with various other government stakeholders in this area, including the Department of Defence, Defence Forces, the Department of Foreign Affairs and Trade and the Department of Justice and Equality. 24 Feasibility Study for a European Cybercrime Centre, Rand Corporation, 2012, 11

15 4. Conclusions Large-scale cyber-attacks reported in March 2013, which slowed down internet traffic across Europe and temporarily brought down the website of a large non-profit organisation, demonstrate the potential impact of targeted cyber-crime for Member States, businesses and citizens. 25 The EU s proposed cybersecurity strategy and Directive attempt to set out a coordinated response to these kinds of incidents, along with potentially even more damaging attacks on financial institutions, healthcare providers and other sections of critical infrastructure. The proposals cut across a number of policy areas, from security and defence to criminal justice and home affairs. In the medium term, and in addition to the time constraint posed by European Parliament elections in May 2014, the proposals face three major challenges as they are discussed in EU institutions in the coming months. Firstly, they must maintain a balance between ensuring that consumers are adequately protected and satisfying the needs of businesses and the private sector as a whole. As they stand, the proposals place a considerable burden on market operators, obliging them to report all significant threats even if responsibility for network security is outsourced. Should market operators feel that these obligations place an excessive burden on their activities, the proposals are unlikely to be finalised in their current form. Secondly, the proposals will require a significant effort of coordination among the agencies and institutions currently operating in the field of cybersecurity. As the range of bodies described in this paper illustrates, there are already a large number of organisations carrying out law enforcement, advisory and technical functions in the EU. Ensuring that these efforts are complementary, particularly between the newly-formed European Cyber-crime Centre (EC3) and the newly-mandated ENISA, will be a key factor in the success of any future legislation. Thirdly, the proposals will require a significant level of commitment on the part of Member States. As stated earlier in this paper, the majority of EU members have not yet adopted national cybersecurity strategies. The success of the proposed reforms will rely in large part on concerted action by national legislatures. 25 Global Internet Slows After Biggest Attack in History, BBC News, 27 March 2013, 12

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

The commission communication "towards a general policy on the fight against cyber crime"

The commission communication towards a general policy on the fight against cyber crime MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08

More information

10025/16 MP/mj 1 DG D 2B

10025/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10025/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

10007/16 MP/mj 1 DG D 2B

10007/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Cyber Intel within European Cybercrime Center Ops

Cyber Intel within European Cybercrime Center Ops @EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3

More information

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project concept 1 Version 1 July 2017 Project title / number (2017/DG1/JP/3692): CyberSouth Cooperation on cybercrime in the Southern

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

NIS-Directive and Smart Grids

NIS-Directive and Smart Grids NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018 The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018 European Union Agency for Network and Information Security Outline 1. Cybersecurity

More information

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,

More information

STATEMENT OF STRATEGY

STATEMENT OF STRATEGY STATEMENT OF STRATEGY 2014-2016 OUR MISSION OUR MANDATE ANALYSIS OF OUR ENVIRONMENT Opportunities Challenges HIGH-LEVEL GOALS STRATEGIES PERFORMANCE INDICATORS Our Mission To protect the individual s right

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Valérie Andrianavaly European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3 Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

National Communications Authority

National Communications Authority National Communications Authority - Press Release The International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence Opens in Accra A three-day International Workshop on Criminal

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

European Directives and reglements for Information security

European Directives and reglements for Information security Е а а И ац а *** European Directives and reglements for Information security Krassi BOGDANOVA LISO for the Secretariat-General, the Cabinets of Commissioners and the European Political Strategy Centre,

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

6056/17 MK/ec 1 DG D 2B

6056/17 MK/ec 1 DG D 2B Council of the European Union Brussels, 8 February 2017 (OR. en) 6056/17 OUTCOME OF PROCEEDINGS From: On: 20 January 2017 To: Subject: General Secretariat of the Council Horizontal Working Party on Cyber

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

Project III Public/private cooperation

Project III Public/private cooperation Project Cybercrime@EAP III Public/private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION

More information

ENISA today and in the future

ENISA today and in the future Udo Helmbrecht Executive Director ENISA COMMITTEE ON INDUSTRY, RESEARCH AND ENERGY European Parliament Brussels, 2 September 2014 For publication European Union Agency for Network and Information Security

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM

More information

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012 ENISA & Cybersecurity Steve Purser Head of Technical Competence Department December 2012 Agenda Protecting Critical Information Infrastructure Input to EU & MS Cyber Security Strategies Assisting Operational

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

MOTION FOR A RESOLUTION

MOTION FOR A RESOLUTION European Parliament 2014-2019 Plenary sitting B8-0155/2019 6.3.2019 MOTION FOR A RESOLUTION to wind up the debate on the statements by the Council and the Commission pursuant to Rule 123(2) of the Rules

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

OAS Cybersecurity Capacity Building Efforts

OAS Cybersecurity Capacity Building Efforts OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,

More information

Cyber Security Beyond 2020

Cyber Security Beyond 2020 Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

Council of the European Union Brussels, 23 November 2016 (OR. en)

Council of the European Union Brussels, 23 November 2016 (OR. en) Conseil UE Council of the European Union Brussels, 23 November 2016 (OR. en) 13323/1/16 REV 1 LIMITE PUBLIC DAPIX 173 ENFOPOL 349 ENFOCUSTOM 163 COSI 156 GENVAL 107 AVIATION 210 NOTE From: To: Subject:

More information

13268/16 EB/dk 1 DGD 1C

13268/16 EB/dk 1 DGD 1C Council of the European Union Brussels, 17 October 2016 (OR. en) 13268/16 OUTCOME OF PROCEEDINGS From: On: 13 October 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 12583/16 Subject:

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

List of beneficiaries who are to be awarded grants for the implementation of CEPOL training activities in 2014

List of beneficiaries who are to be awarded grants for the implementation of CEPOL training activities in 2014 List of beneficiaries who are to be awarded grants for the implementation of CEPOL training activities in 2014 No. Title of the beneficiary Granted training activity Maximum budget covered by CEPOL, JOINT

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

PROJECT RESULTS Summary

PROJECT RESULTS Summary Project funded by the European Union Operational Programme Technical Assistance for Institutional Building - TAIB 2012 www.fighting-occ.mk Strengthening the National Capacities for the Fight Against Organised

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

"Cybersecurity in Europe and the EU- Russia Co-operation"

Cybersecurity in Europe and the EU- Russia Co-operation SPEECH/03/185 Mr Erkki Liikanen Member of the European Commission, responsible for Enterprise and the Information Society "Cybersecurity in Europe and the EU- Russia Co-operation" IT Security Russia Conference

More information

Regulating Cyber: the UK s plans for the NIS Directive

Regulating Cyber: the UK s plans for the NIS Directive Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon

More information

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3 Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

Issue I. Airport Communication Project

Issue I. Airport Communication Project Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office

More information

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy

More information

10496/18 MC/sl 1 DGD 2

10496/18 MC/sl 1 DGD 2 Council of the European Union Brussels, 26 June 2018 (OR. en) 10496/18 OUTCOME OF PROCEEDINGS From: On: 26 June 2018 To: General Secretariat of the Council Delegations No. prev. doc.: 10072/18 Subject:

More information

Designing Robustness and Resilience in Digital Investigation Laboratories

Designing Robustness and Resilience in Digital Investigation Laboratories DIGITAL FORENSIC RESEARCH CONFERENCE Designing Robustness and Resilience in Digital Investigation Laboratories By Philipp Amann and Joshua James Presented At The Digital Forensic Research Conference DFRWS

More information

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud Cybersecurity Policy in the EU: The Network and Information Security Directive - Security for the data in the cloud Microsoft Commitment to Cybersecurity Security at the heart of our products and services

More information

DRAFT PROGRAMME. Exchange of views with experts on the fight against Cybercrime

DRAFT PROGRAMME. Exchange of views with experts on the fight against Cybercrime European Parliament 2014-2019 Committee on Civil Liberties, Justice and Home Affairs LIBE(2017)0424_1 DRAFT PROGRAMME Exchange of views with experts on the fight against Cybercrime Monday, 24 April 2017

More information

Cyber Security Development. Ghana in Perspective

Cyber Security Development. Ghana in Perspective Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review

More information

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications

More information

Cybersecurity Package

Cybersecurity Package Cybersecurity Package Highlights of key initiatives Domenico Ferrara Policy officer @ DG CONNECT Brussels, 12 December 2017 1 2013-2017: Evolving threat landscape Proliferation of (poorly secured) IoT

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting

More information