Directive on security of network and information systems (NIS): State of Play
|
|
- Asher Robbins
- 5 years ago
- Views:
Transcription
1 Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission 4 October 2017
2 The umbrella strategy EU Cybersecurity Strategy: An Open, Safe and Secure Cyberspace Digital Agenda for Europe Justice and Home Affairs EU Foreign and Security Policy 1. Cyber resilience - NIS Directive (capabilities, cooperation, risk management, incident reporting) - Raising awareness 2. Reduce cybercrime 3. Cyber defence policy and capabilities 5. International cyberspace policy 4. Industrial and technological resources: NIS platform; H2020 Fundamental rights apply both in physical and digital world Cybersecurity depends on and contributes to protecting fundamental rights Access for all Democratic and efficient multi-stakeholder governance Cybersecurity is a shared responsibility 2
3 The NIS Directive: from proposal to transposition 21 months after entry into force for transposition into national laws (9 May 2018) Additional 6 months to identify Operators of essential services (9 Nov 2018) 6 July 2016 Entry into force 20 days After publication in OJ Transposition Final Adoption 7 Dec 2015 Sixth informal trialogue February 2013 Political Agreement EC proposal COM (2013)48) 3
4 06 July 2016 First comprehensive EU cybersecurity legislation adopted! 4
5 The NIS Directive: objectives Increased national cybersecurity capabilities EU level cooperation Security & Notification requirements Boosting the overall cybersecurity in Europe
6 Capabilities All MS to have in place NIS National strategy NIS competent national authority Computer Security Incident Response Team (CSIRT) 6
7 National NIS strategies Strategic objectives, priorities & governance framework Identification of measures on preparedness, response & recovery Cooperation methods between the public and private sectors Awareness raising, training and education Research & development plans related to NIS Strategy Risk assessment plan List of actors involved in the strategy implementation 7
8 National competent authorities National competent authority One Multiple Cover(s) the sectors referred to in Annex II & III Its role may be assigned to an existing authority 8
9 Single Point of contact Coordination at national level in case there are different competent authorities Single Point of Contact Liaison function to ensure cross-border cooperation with other Member States and with the Cooperation Group and the CSIRTs network Reports annually to the Cooperation Group on the notifications received within Member State Forwarding of notification to single points of contact of other affected MSs (upon request) 9
10 CSIRTs - Computer Security Incident Response Teams Tasks: - Monitoring incidents at nat.level; One or more CSIRT? Within competent authority or not? - Providing early warning, alerts & dissemination of relevant information; - Responding to incidents; -Providing dynamic risks and incident analysis & situational awareness; Compliance with the requirements set up in Annex I (1) -Participation in the CSIRT network, etc. 10
11 Cooperation Cooperation Group what: strategic cooperation who: MSs; EC (secretariat), ENISA CSIRT network what: operational cooperation who: national CSIRTs; CERT-EU; ENISA (secretariat) 11
12 Cooperation Group - Tasks 12
13 CSIRTs Network - Tasks Exchange info on CSIRTs services, operations & capabilities Exchange info on individual incidents (on request & voluntary) Discuss lessons learnt from NIS exercises Discuss individual CSIRT issues (on request) Identify coordinated response to incidents (on request & voluntary) Tasks Guidelines on Operational cooperation Support cross-border incident handling (voluntary) Inform Cooperation Group & seek guidance Explore further forms of operational cooperation Report as input to EC review every 1,5 yrs 13
14 Security and notification requirements Categories of Operators Operators of essential Services (Annex II) Digital Service Providers (Annex III) 14
15 Operators of essential services Energy Electricity Gas - Oil Transport Air Rail Water Road Banking Credit institutions Financial market infrastructure Health care settings Including hospitals and private clinics Water Drinking water supply and distribution Digital infrastructure Internet exchange points - Domain name system service providers - Top level domain name registers 15
16 Digital Services Providers (DSPs) Online market places Cloud computing services Search engines 16
17 Security requirements MSs shall ensure that Operators of Essential Services and Digital Service Providers adopt security requirements to: Prevent risks Technical and organisational measures that are appropriate & proportionate to the risk. Ensure NIS The measures should ensure a level of NIS security appropriate to the risks. Handle Incidents The measures should prevent and minimize the impact of incidents on the IT systems used to provide the services.
18 Notification requirements MSs shall ensure notifications without undue delay to the competent authority or to the CSIRT. Operators of Essential services Add Your Title "incidents having a significant impact on the continuity of the essential services they provide.[...]" Digital Services providers "any incident having a substantial impact on the provision of a service as referred to in Annex III that they offer within the Union"
19 Identification of operators of essential services
20 Identification process in 6 steps 1. Does the entity belong to a sector/subsector & correspond to the type covered by Annex II Directive? YES NO NIS Directive doesn't apply 2. Is a lex specialis applicable? NO YES NIS Directive doesn't not apply 20
21 Identification process in 6 steps 3. Is the operator providing an essential service within the meaning of the Directive? List of essential services YES NO NIS Directive doesn't apply 4. Does the service depend on network and information systems? YES NO NIS Directive doesn't apply 21
22 Identification process in 6 steps 5. Would a cyber incident have a significant disruptive effect? Cross-sectoral factors (specified in the Directive) number of users relying on the services dependency of other essential sectors on the service impact that incidents could have on economy and societal activities or public safety possible geographic spread importance of the entity for maintaining a sufficient level of the service Sector-specific factors (not specified - examples) Energy: volume or proportion of national power generated Transport: proportion of national traffic volume & number of operations per year Health: number of patients under the provider s care per year. YES NO NIS Directive doesn't apply 22
23 Identification process in 6 steps 6. Is the operator concerned providing essential services in other Member States? YES NO Mandatory consultation with the MS(s) concerned Adoption of national measures (e.g. list of operators of essential services, policy and legal measures). 23
24 Voluntary notifications Entities falling outside the scope of the Directive may notify incidents having a significant impact on the continuity of the services they provide on a voluntary basis.
25 Communication on 'Making the most of NIS: towards the effective implementation of the NIS Directive
26 Communication on 'Making the most of NIS-towards the effective implementation of the NIS Directive Communication: Core elements of the Communication Presenting key conclusions of the analysis of the issues covered in the Annex, which are seen as important points of reference and potential inspiration from the point of view of the transposition into national law. Accompanied by an Annex with practical suggestions Based on -good practices and recommendations issued by ENISA -Examples from Member States -Interpretation of Directive's provisions and of how they would work in practice 26
27 Key messages of the Communication Put in place comprehensive and ambitious national strategies Ensure effective and adequately resourced national CSIRTs Ensure effectiveness of implementation and enforcement Align the national approaches on Operators of Essential Services Extend the scope of the NIS Directive to additional sectors, e.g. public administration 27
28 Thank you for your attention!
Directive on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationNIS-Directive and Smart Grids
NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationNetwork and Information Security Directive
Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information
More informationENISA s Position on the NIS Directive
ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationCybersecurity Policy in the EU: Security Directive - Security for the data in the cloud
Cybersecurity Policy in the EU: The Network and Information Security Directive - Security for the data in the cloud Microsoft Commitment to Cybersecurity Security at the heart of our products and services
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationCybersecurity Strategy of the Republic of Cyprus
Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationRegulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationCreating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular
Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr) What NIS actually is? NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationCOMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises
EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationExploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know
Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationCOMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document
EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European
More informationResilience, Deterrence and Defence: Building strong cybersecurity for the EU
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy
More informationThe Network and Information Security Directive - ENISA's contribution
The Network and Information Security Directive - ENISA's contribution Konstantinos Moulinos Information Security Expert 3rd IMPROVER- ERNCIP Operators Workshop Lisbon 23.05.2018 European Union Agency for
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationCONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE
CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the
More informationEuropean Directives and reglements for Information security
Е а а И ац а *** European Directives and reglements for Information security Krassi BOGDANOVA LISO for the Secretariat-General, the Cabinets of Commissioners and the European Political Strategy Centre,
More informationThe European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3
The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum
More informationThe GDPR and NIS Directive: Risk-based security measures and incident notification requirements
The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant
More informationInfrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA
Security and resilience for ehealth Infrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA European Union Agency For Network And Information Security Securing Europe
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationNew cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017
in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationEU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know
EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know The General Data Protection Regulation (GDPR) The eprivacy Regulation (epr) The Network and Information Security Directive
More informationCybersecurity Package
Cybersecurity Package Highlights of key initiatives Domenico Ferrara Policy officer @ DG CONNECT Brussels, 12 December 2017 1 2013-2017: Evolving threat landscape Proliferation of (poorly secured) IoT
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationThe Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017
The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA
More informationETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)
ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationThe EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018
The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018 European Union Agency for Network and Information Security Outline 1. Cybersecurity
More informationA Strategy for a secure Information Society Dialogue, Partnership and empowerment
A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information
More informationCyber Security Beyond 2020
Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.
More informationNIS Directive development The Incident Notification Framework
NIS Directive development The Incident Notification Framework Dan Tofan #certcon 30.10.2017 Bucharest European Union Agency for Network and Information Security Topics 01 NISD Short Intro 02 The incident
More information10025/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10025/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationEISAS Enhanced Roadmap 2012
[Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationTHE CYBER SECURITY ENVIRONMENT IN LITHUANIA
Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit
More informationLegislative Framework
Legislative Framework forcip in Austria Sylvia Mayer Federal Agency for State Protection and Counter Terrorism Damage of 21 transmission masts Development in Europe andaustria EU, 2005: EPCIP(European
More informationCritical Infrastructure Protection in the European Union
20 January, 2015 The European GNSS Programmes 1 ICG9, Prague 9-14 November 2014 Critical Infrastructure Protection in the European Union 20 January, 2015 The European GNSS Programmes 2 Each EU Member State
More informationValérie Andrianavaly European Commission DG INFSO-A3
Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:
More informationWorking with the EU Directive High common level of network and information security. Martin Apel, SANS ICS Summit, Munich und
Working with the EU Directive High common level of network and information security Martin Apel, SANS ICS Summit, Munich und 18.06.2018 Outline 1. Overview over NIS-Directive 2. Who is an operator of essential
More informationCouncil of the European Union Brussels, 14 September 2017 (OR. en)
Council of the European Union Brussels, 14 September 2017 (OR. en) 12205/17 ADD 1 COVER NOTE From: date of receipt: 13 September 2017 To: CYBER 128 TELECOM 208 DATAPROTECT 142 JAI 786 MI 630 CSC 206 Secretary-General
More informationSecurity and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy
Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationEUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity
EUROPEAN COMMISSION JOINT RESEARCH CENTRE Information Note JRC activities in the field of Cybersecurity Date: 28 January, 2016 JRC activities in the field of Cybersecurity 1. Societal and political context
More informationBradford J. Willke. 19 September 2007
A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure
More informationENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012
ENISA & Cybersecurity Steve Purser Head of Technical Competence Department December 2012 Agenda Protecting Critical Information Infrastructure Input to EU & MS Cyber Security Strategies Assisting Operational
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationCEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT
2017-2 CEF Telecom Calls: CEF-TC-2017-2: Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT CEF-TC-2017-2: Cyber Security Funding under this call will allow the Member States to limit the economic
More informationCyber Security in Europe and CEER s new PEER initiative
NARUC-CEER International Forum, 27 April 2017, Arlington, Virginia Cyber Security in Europe and CEER s new PEER initiative Lord Mogg, CEER President Outline New EU legislativedevelopments: NIS Directive
More informationA comprehensive approach on personal data protection in the European Union
A comprehensive approach on personal data protection in the Justice Date 1 Main legal instruments on EU level Data Protection Directive 95/46/EC Directive 2002/58/EC on privacy and electronic communications
More informationSecure Societies Work Programme Call
Secure Societies Work Programme 2018-2020 2019 Call Andrea DE CANDIDO Deputy Head of Unit Innovation and Industry for Security European Commission andrea.de-candido@ec.europa.eu Outline 1. Policy context
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationEU Code of Conduct on Data Centre Energy Efficiency
EUROPEAN COMMISSION DIRECTORATE-GENERAL JRC JOINT RESEARCH CENTRE Institute for Energy Renew able and Energy Efficiency Unit EU Code of Conduct on Data Centre Energy Efficiency Introductory guide for all
More informationInformation sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3
Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and
More informationPlan a Pragmatic Approach to the new EU Data Privacy Regulation
AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General
More informationCommittee on Civil Liberties, Justice and Home Affairs
EUROPEAN PARLIAMT 2009-2014 Committee on Civil Liberties, Justice and Home Affairs 2013/0027(COD) 7.1.2014 AMDMTS 20-147 Draft opinion Carl Schlyter (PE514.755v01-00) on the proposal for a directive of
More informationShaping the Cyber Security R&D Agenda in Europe, Horizon 2020
Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020 Aristotelis Tzafalias Trust and Security unit DG Communica4ons Networks, Content and Technology European Commission Shaping the Cyber Security
More informationCyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB
Cyber Security Strategic Level Landscape in Poland Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Big picture January 2015 2013 June 2013 CSIRTs in Poland CERT.GOV.PL - Governmental CERT est. 2008
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationH2020 WP Cybersecurity PPP topics
Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationMETHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS
METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a Yes, No, Partial, or Not Applicable
More informationGuidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17
GUIDELINES ON SECURITY MEASURES FOR OPERATIONAL AND SECURITY RISKS UNDER EBA/GL/2017/17 12/01/2018 Guidelines on the security measures for operational and security risks of payment services under Directive
More information10007/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationHow the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015
How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of
More information***I DRAFT REPORT. EN United in diversity EN. European Parliament 2017/0225(COD)
European Parliament 2014-2019 Committee on Industry, Research and Energy 2017/0225(COD) 27.3.2018 ***I DRAFT REPORT on the proposal for a regulation of the European Parliament and of the Council on ISA,
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationCybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus
Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,
More informationCERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria
CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic
More informationThe SPARKS Project Motivation, Objectives and Results
The SPARKS Project Motivation, Objectives and Results Paul Smith paul.smith@ait.ac.at AIT Austrian Institute of Technology SEGRID Project Workshop 14 th November, 2016, Barcelona, Spain The SPARKS Project
More informationIntroductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht
Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationSTANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL?
ETSI SUMMIT Releasing the Flow Data Protection and Privacy in a Data-Driven Economy 19 April 2018 STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL? Presented by
More informationH2020 Opportunities in the Area of Security and Critical Infrastructure Protection
H2020 Opportunities in the Area of Security and Critical Infrastructure Protection Angelo MARINO Head of Unit Security Research AIIC General Assembly Rome, 26/10/2013 NOT LEGALLY BINDING Outline The context:
More informationEnhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert
Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert European Union Agency For Network And Information Security Securing Europe s Information
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationPrivacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016
Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Pēteris Zilgalvis, J.D., Head of Unit for Health and Well-Being, DG CONNECT Table of Contents 1. Context
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationehealth Network ehealth Network Governance model for the ehealth Digital Service Infrastructure during the CEF funding
ehealth Network Governance model for the ehealth Digital Service Infrastructure during the CEF funding 1 The ehealth Network is a voluntary network, set up under article 14 of Directive 2011/24/EU. It
More informationCritical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016
Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange Dennis Denham Ssempereza - CISA, CISM, CRISC August 16, 2016 About me! Involved in Risk Management and Security
More informationWELCOME ISO/IEC 27001:2017 Information Briefing
WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.
More information