Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular

Similar documents
Directive on security of network and information systems (NIS): State of Play

Directive on Security of Network and Information Systems

The NIS Directive and Cybersecurity in

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Regulating Cyber: the UK s plans for the NIS Directive

Network and Information Security Directive

NIS-Directive and Smart Grids

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

Critical Infrastructure Protection in the European Union

ENISA s Position on the NIS Directive

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Cybersecurity Strategy of the Republic of Cyprus

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

NIS Directive development The Incident Notification Framework

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

European Union Agency for Network and Information Security

Discussion on MS contribution to the WP2018

Cybersecurity & Digital Privacy in the Energy sector

The Network and Information Security Directive - ENISA's contribution

ehealth action in the EU

ENISA Cooperation in the EU / NIS Directive

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

ENISA EU Threat Landscape

General Data Protection Regulation (GDPR)

Working with the EU Directive High common level of network and information security. Martin Apel, SANS ICS Summit, Munich und

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Infrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Data Breach Notification: what EU law means for your information security strategy

Package of initiatives on Cybersecurity

MOTION FOR A RESOLUTION

Call for Expressions of Interest

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

Promoting Global Cybersecurity

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

ECB-PUBLIC OPINION OF THE EUROPEAN CENTRAL BANK. of 18 May 2018

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

NIS Directive : Call for Proposals

GDPR: A QUICK OVERVIEW

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

PIPELINE SECURITY An Overview of TSA Programs

EISAS Enhanced Roadmap 2012

13967/16 MK/mj 1 DG D 2B

THE CONNECTING EUROPE FACILITY

Commonwealth Cyber Declaration

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council

CNPD Course: Data Protection Basics

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

ESRIF & Working Group Innovation WG 9. Alois J. Sieber Chairman ESRIF WG # 9

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

Cyber Security Strategy

The Regional Electricity Market Platform

NHS Wales. Dr Carwyn Lloyd-Jones

Why you should adopt the NIST Cybersecurity Framework

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

JOINT MOTION FOR A RESOLUTION

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012

INFORMATIZATION AND COMMUNICATION DEVELOPMENT TRENDS IN ARMENIA

Concept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua

Response to the Security of Network and Information Systems Public Consultation Compiled on behalf of the UK Computing Research Committee, UKCRC.

A comprehensive approach on personal data protection in the European Union

International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

Trust Services for Electronic Transactions

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Legislative Framework

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Section I. GENERAL PROVISIONS

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

1st IEF-EU Energy Day Preceding the 7th IEA-IEF-OPEC Symposium on Energy Outlooks 14 February 2017

Cyber Security Law --- How does it affect the business operations in China? Xun Yang Of Counsel, Commercial IP and Technology

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

Cybersecurity Considerations for GDPR

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Transcription:

Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr)

What NIS actually is?

NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory for all EU states NOT Mandatory for all EU companies Focus on essential/critical services

Scope Operators of Essential Services - OES Digital Service Providers - DSP

OES Entity supplies service essential for maintaining critical social and economic activities Service supply fully depends on ICT Cyber incident would significantly impact service delivery

OES Energetics electricity, oil, gas.. Transportation air, railway, roads, mainland Banking credit institutions Financial markets infrastructure Health Water supply Digital infrastructure

DSP Online marketplace Online search engine Cloud computing service

Important dates August, 2016 entry February, 2017 CG/CN starts May, 2018 transposition into local legal framework November, 2018 MS to identify and report ES 2018 - EC control 2020+ - broad scope

Expectations

Member states Sectoral authorities Single POC Cyber strategy CERT

Incident reporting Incident reporting towards authority with no delay 24-72 h from discovery

Standards State-of-the-art equipment Guaranteed security level according to risk

What transposition is?

EU Directive vs EU regulation EU Regulation Immediately applicable and enforcable by law in all Member States As good practice, Member States issue national legislation that defines the competent national authorities, inspection and sanctions on the subject matter EU Directive Sets certain aims, requirements and concrete results that must be achieved in every Member State Sets a process for it to be implemented by Member States National authorities must create or adopt their legislation to meet these aims by the date specified in each given Directive

Croatia - current state of play

Croatia current state of play Youngest EU member state - July 2013 (Rather) Young country/democracy/free market All NIS sectors covered by law but Sectoral regulation banking and financial markets Water management NO CI

How we did it?

Process Working Group (WG) summer 2017 Weekly meetings, drafting, polishing Final draft December 2017

Who? NSA CERT Community Sectoral representatives Regulators MFA

Steps Identify current legislation mostly non-existent Develop identification criteria by sector Analyze current audit/cert capacities by sector Identify national competent authorities (NCA) Develop legislation scheme Write the LAW..

Centralized Vs. Sectoral Depending on current country set up Centralized: Single organization Cyber skilled setup, NCSC Sectoral Multiple sectoral authorities Dispersed management

Legislation scheme OES and DSP cyber security law Roles Deadlines Criteria Penalties Statute on cyber security measures Security measures Reporting procedures Guidelines

Criteria - challenges What is essential? Different views by each sector Several types of criteria: Number of users Unique service provider Capacities Market share Geographic dispersity

Croatia custom design Sectoral approach Compliance body 2 CERTs 8th sector Government information infrastructure services e-citizen Business services for state budget users

Lessons learned

What could have been done better? Develop national regulation/legislation Foster (cross)sector cooperation Invest in NCA skills and awareness Start early Communicate Test

Predictions Scenario 1 Not enough power/will to conduct by new law Not enough resources within key role players OES not investing Scenario 2 Full implementation with deadline flexibility Close cooperation with OES Use of CEF funds Development of strong internal cyber services market