A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Similar documents
Security and resilience in Information Society: the European approach

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

13967/16 MK/mj 1 DG D 2B

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Package of initiatives on Cybersecurity

EISAS Enhanced Roadmap 2012

Securing Europe's Information Society

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Cybersecurity & Digital Privacy in the Energy sector

ENISA EU Threat Landscape

Cyber Security in Europe

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Commonwealth Cyber Declaration

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

Directive on security of network and information systems (NIS): State of Play

Cyber security: a building block of the Digital Single Market

European Union Agency for Network and Information Security

ehealth action in the EU

Promoting Global Cybersecurity

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

NIS Standardisation ENISA view

H2020 WP Cybersecurity PPP topics

NIS-Directive and Smart Grids

DIGITAL AGENDA FOR EUROPE

IPv6 deployment, European Commission involvement. RIPE 60 Prague 4May Per Blixt

Research Infrastructures and Horizon 2020

Digital Security. Rafael Tesoro Carretero DG CNECT, Unit H1 - Cybersecurity & Digital Privacy

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

RESOLUTION 130 (Rev. Antalya, 2006)

Enhancing the cyber security &

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Horizon 2020 Security

Joint Declaration by G7 ICT Ministers

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

RESOLUTION 130 (REV. BUSAN, 2014)

The commission communication "towards a general policy on the fight against cyber crime"

RESOLUTION 45 (Rev. Hyderabad, 2010)

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

R&D to shape the networks and services of the future

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

ENISA Cooperation in the EU / NIS Directive

Regional Development Forum For the Arab States(RDF-ARB) 2018

ENISA s Position on the NIS Directive

H2020 & THE FRENCH SECURITY RESEARCH

Directive on Security of Network and Information Systems

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

ehealth in Europe: at the convergence of technology, medicine, law and society

Securing Europe s IoT Devices and Services

IPv6 Task Force - Phase II. Welcome

EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER

CEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT

***I DRAFT REPORT. EN United in diversity EN. European Parliament 2018/0328(COD)

The NIS Directive and Cybersecurity in

Research Infrastructures and Horizon 2020

Cyber Security in Europe and CEER s new PEER initiative

Cybersecurity Package

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

ENISA today and in the future

Society, the economy and the state depend on information and communications technology (ICT).

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

European Cybersecurity PPP European Cyber Security Organisation - ECSO

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

European Directives and reglements for Information security

Angela McKay Director, Government Security Policy and Strategy Microsoft

Cybersecurity for ALL

Discussion on MS contribution to the WP2018

DG GROW meeting with Member States in preparation of Space Strategy 8 th July Working document#1: Vision and Goals

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

"Cybersecurity in Europe and the EU- Russia Co-operation"

Khoen LIEM. Industrial Policy. A systematic approach for Civil Security: From EU Security- Research Policy

Cyber Security Roadmap

Borderless ehealth in support of healthy citizens in Europe

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

ESFRI Strategic Roadmap & RI Long-term sustainability an EC overview

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Summary. Strategy at EU Level: Digital Agenda for Europe (DAE) What; Why; How ehealth and Digital Agenda. What s next. Key actions

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18

MOTION FOR A RESOLUTION

HEALTH IN ECSO (European Cyber Security Organisation) 18 October 2017

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020

Towards a European Cloud Computing Strategy

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

Seventh Framework Programme Security Research. Health Security Committee CBRN Section. 30 September by Clément Williamson

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

Transcription:

A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information Security 1

Base: Why a new strategy? Communication of European Commission (31.5.06), Resolution of EU Council (11.12.06) Objective: to revitalise EC s strategy of 2001 New business and technical paradigms Security became a political issue Increasing focus on the protection of critical infrastructures To improve coordination between the various EC policy initiatives To answer the demand of EU and international stakeholders to cooperate To take the new born ENISA into account To stimulate a risk management approach 2

The Challenges (1/2) Technical Dimension Threat landscape changes (criminality) Convergence of digital services Pervasiveness of ICT Mobile computing, wireless connectivity Economic dimension Make the EU ICT industry a competitive supplier Private and public sectors as demanding users Security seen as an advantage instead of a cost Economical dependence on ICT security Financial loss due to poor risk preparedness 3

The Challenges (2/2) Social dimension Citizens & consumers may become vehicles of attacks Societal dependence on ICT Protection of fundamental rights. Balance between NIS policies and civil liberties Legal dimension A substantial body of legislation relevant to NIS exists Need for new legal and/or regulatory measures. Need for coherence. Related EC texts: Spam & malware, Cybercrime, PET, Review of the telecom regulatory framework (may be: liability, leakages, safeguards, ), Protection of critical information infrastructures 4

Towards a secure Information Society DIALOGUE structured and multi-stakeholder PARTNERSHIP greater awareness & better understanding of the challenges Open & inclusive multi-stakeholder debate EMPOWERMENT commitment to responsibilities of all actors involved 5

Dialogue Exchange of NIS-related policies between Member States Raise awareness and strengthen trust of SMEs + citizens on risks & solutions Agreement on a Balance between security and privacy protection Policy for protection of critical infrastructures Industry commitment to adopt a culture of security 6

Partnerships Improve knowledge of the problem Devise a data collection framework to collect EU-wide data on security incidents and consumer confidence To gather data on trends in ICT security Support response capability To examine the feasibility of a European information sharing and alert system (including a multi-lingual security portal) 7

Invite EU Member States to: Empowerment Promote awareness on benefits of security practices; Transfer best practice of national NIS policies; Leverage e- Gov services to promote good practices; Stimulate security in higher education curricula. Invite private sector to take initiatives to: Develop definition of responsibilities for producers & ISP. Work towards affordable security certification schemes for products, processes and services (including privacy). Promote diversity, openness, interoperability, usability and competition. Promote training programmes to provide employees with skills to implement security practices. Developing risk management methods & culture of risk management in organisations 8

Research: FP7 ICT: Secure, dependable & trusted infrastructures Call 1 (opening 22.12.06, closing 8.5.07), Budget: 90 M Security and resilience in network infrastructures Scalable, context-aware, secure & resilient architectures & technologies Real-time detection and recovery against intrusions and failures Security & trust in dynamic & reconfigurable service architectures Trusted computing infrastructures Security & dependability in the engineering of SW and service Identity Management and Privacy enhancing tools Coordination & Support Activities Call 2 (2H2007): New paradigms and experimental facilities Protection of critical infrastructures (joint call with FP7-Security) Information Day: 26.2.07, Brussels See http://cordis.europa.eu/ist/trust-security/index.htm 9

Documents COM(2006) 251 A Strategy for a secure Information Society Dialogue, Partnership and empowerment http://ec.europa.eu/governance/impact/docs/ia_2006/com_2006_02 51_en.pdf SEC(2006) 656 Commission Staff Working Document Impact Assessment http://ec.europa.eu/governance/impact/docs/ia_2006/sec_2006_065 6_en.pdf 10