SlideShare a Scribd company logo
1 of 10
www.enisa.europa.eu
Please replace background with image
ENISA and standards
Sławomir Górniak
Athens-Heraklion, 21st July 2014
www.enisa.europa.eu 2
ENISA and standards
• Regulation (EC) 460/2004
– Art. 3 – In order to ensure that the scope and objectives set out in
Articles 1 and 2 are complied with and met, the Agency shall
perform the following tasks:
• (g): to track the development of standards for products and
services on network and information security
• However
– (12) The exercise of the Agency's tasks should not interfere with
the competencies and should not pre-empt, impede or overlap
with the relevant powers and tasks conferred on:
• the European standardisation bodies, the national
standardisation bodies and the Standing Committee as set out
in Directive 98/34/EC of the European Parliament and of the
Council of 22 June 1998 laying down a procedure for the
provision of information in the field of technical standards and
regulations and of rules on Information Society Services(14),
www.enisa.europa.eu
ENISA and standards
• Regulation 526/2013, Art.3.1d
• Support research and development and
standardisation, by:
– (i) facilitating the establishment and take-up of European
and international standards for risk management and for
the security of electronic products, networks and services;
– (ii) advising the Union and the Member States on research
needs in the area of network and information security with
a view to enabling effective responses to current and
emerging network and information security risks and
threats, including with respect to new and emerging
information and communications technologies, and to using
risk-prevention technologies effectively;
www.enisa.europa.eu
ENISA approach to standards
• Aim: promotion of best practices through SDOs
• ENISA role: interface between private sector,
public sector, SDOs
• Short- and mid-term goals
– Formal cooperation with SDOs and specific WGs
– Working collaboration with SDOs
• Long-term goal
– Review of and participation in NIS standardisation activities
– Proposal of standards, via means of proposals for
standardisation mandates.
www.enisa.europa.eu
ENISA and SDOs
• Established collaboration agreements with:
– ISO SC27 (Liaison)
– ETSI (MoU)
• Exchange of information of mutual interest
• Organisation of joint meetings and workshops
• ENISA to channel standardisation activities to ETSI, if
appropriate
• Exchange of working documents, within well defined frames
• ENISA to nominate observers for ETSI Technical Bodies
– CEN CENELEC (MoU)
– ITU SG17 (MoU started!)
• ENISA aligns key activities with the work of SDOs
– ETSI TISPAN on CIIP, ESI on eID, CLOUD on cloud
certification
– CEN CENELEC on smart grids;
– ISO SC 27 in the area of privacy;
www.enisa.europa.eu
Challenges from EU perspective
• Lack of consistent strategy towards standards
• Recognized shortcomings of the current approach
• Need establishing a small number of key initiatives
at EU level
• Improve coordination between EU funded R&D and
SDOs
• Possible ‘vehicles’ for such a coordination:
– ETSI CEN CENELEC CSCG
– Horizon 2020
www.enisa.europa.eu
ETSI CEN-CENELEC Cyber Security
Coordination Group (CSCG)
• Give strategic advice to the technical committees of CEN,
CENELEC and ETSI
• Develop a gap analysis of European and International
Standards on cyber security
• Define of joint European requirements for European and
International Standards on cyber security
• Establish a European roadmap on standardization of
cyber security
• Act as contact point for all questions of EU institutions
relating to standardization of cyber security
• Suggest a joint US and European strategy for the
establishment of a framework of International standards
on cyber security
www.enisa.europa.eu 8
CSCG Action Plan
• #1 – Governance Framework
• #2 – Common Understanding Of “Cyber Security”
• #3 – Trust In The European Digital Environment
• #4 – European Pki And Cryptographic Capabilities
• #5 – European Cyber Security Label
• #6 – European Cyber Security Requirements
• #7 – European Cyber Security Research
• #8 – Eu Industrial Forum On Cyber Security Standards
• #9 – Eu Global Initiative On Cyber Security Standards
www.enisa.europa.eu 9
2014: ETSI ESI “Algo paper”
• ETSI TR 119 312
– Business Guidance on Cryptographic Suites
• ETSI TS 119 312
– Cryptographic suites
• ENISA reports 2013
– Recommended cryptographic measures
– Algorithms, Key Sizes and Parameters
• Collaboration 2014 –>
www.enisa.europa.eu 10
European Union Agency for Network and Information Security
Science and Technology Park of Crete
P.O. Box 1309
71001 Heraklion
Crete
Greece
Follow ENISA
http://www.enisa.europa.eu

More Related Content

What's hot

isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturityDNIF
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-systemintellisenseit
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metricsVladimir Jirasek
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 

What's hot (20)

isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Audit ISO 19011:2011 e ISO 27001:2013
Audit ISO 19011:2011 e ISO 27001:2013Audit ISO 19011:2011 e ISO 27001:2013
Audit ISO 19011:2011 e ISO 27001:2013
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Blowfish Cryptosystem
Blowfish Cryptosystem Blowfish Cryptosystem
Blowfish Cryptosystem
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
Risk management & ISO 31000
Risk management & ISO 31000Risk management & ISO 31000
Risk management & ISO 31000
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-system
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Cissp Training PPT
Cissp Training PPTCissp Training PPT
Cissp Training PPT
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 

Similar to Enisa and cyber security standards

The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
 
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012Paris Open Source Summit
 
European Cybersecurity Context
European Cybersecurity ContextEuropean Cybersecurity Context
European Cybersecurity ContextMiguel A. Amutio
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesKarlos Svoboda
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsBigData_Europe
 
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Asociación XBRL España
 
The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of SpainMiguel A. Amutio
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter IIJavier Tallón
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkDeutsche Telekom AG
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...chronaki
 
Digital Identity Standards by ENISA, European Union
Digital Identity Standards by ENISA, European UnionDigital Identity Standards by ENISA, European Union
Digital Identity Standards by ENISA, European Unionsoranun1
 
EOSC-hub and the NGIs
EOSC-hub and the NGIsEOSC-hub and the NGIs
EOSC-hub and the NGIsOpenAIRE
 
Recommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiRecommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiMetamorphosis
 

Similar to Enisa and cyber security standards (20)

The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
Protecting Europe's Network Infrastructure
 Protecting Europe's Network Infrastructure Protecting Europe's Network Infrastructure
Protecting Europe's Network Infrastructure
 
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
 
European Cybersecurity Context
European Cybersecurity ContextEuropean Cybersecurity Context
European Cybersecurity Context
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network Technologies
 
procent
procentprocent
procent
 
European priorities in information security
European priorities in information securityEuropean priorities in information security
European priorities in information security
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
 
The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of Spain
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...
 
Digital Identity Standards by ENISA, European Union
Digital Identity Standards by ENISA, European UnionDigital Identity Standards by ENISA, European Union
Digital Identity Standards by ENISA, European Union
 
EOSC-hub and the NGIs
EOSC-hub and the NGIsEOSC-hub and the NGIs
EOSC-hub and the NGIs
 
E Society Ict En
E Society Ict EnE Society Ict En
E Society Ict En
 
Recommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiRecommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon Stefanovski
 

More from European Union Agency for Network and Information Security (ENISA) (6)

The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Power Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications SectorPower Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications Sector
 
Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
 
Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management
 
Enisa internet mapping project-20130523
Enisa internet mapping project-20130523Enisa internet mapping project-20130523
Enisa internet mapping project-20130523
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Enisa and cyber security standards

  • 1. www.enisa.europa.eu Please replace background with image ENISA and standards Sławomir Górniak Athens-Heraklion, 21st July 2014
  • 2. www.enisa.europa.eu 2 ENISA and standards • Regulation (EC) 460/2004 – Art. 3 – In order to ensure that the scope and objectives set out in Articles 1 and 2 are complied with and met, the Agency shall perform the following tasks: • (g): to track the development of standards for products and services on network and information security • However – (12) The exercise of the Agency's tasks should not interfere with the competencies and should not pre-empt, impede or overlap with the relevant powers and tasks conferred on: • the European standardisation bodies, the national standardisation bodies and the Standing Committee as set out in Directive 98/34/EC of the European Parliament and of the Council of 22 June 1998 laying down a procedure for the provision of information in the field of technical standards and regulations and of rules on Information Society Services(14),
  • 3. www.enisa.europa.eu ENISA and standards • Regulation 526/2013, Art.3.1d • Support research and development and standardisation, by: – (i) facilitating the establishment and take-up of European and international standards for risk management and for the security of electronic products, networks and services; – (ii) advising the Union and the Member States on research needs in the area of network and information security with a view to enabling effective responses to current and emerging network and information security risks and threats, including with respect to new and emerging information and communications technologies, and to using risk-prevention technologies effectively;
  • 4. www.enisa.europa.eu ENISA approach to standards • Aim: promotion of best practices through SDOs • ENISA role: interface between private sector, public sector, SDOs • Short- and mid-term goals – Formal cooperation with SDOs and specific WGs – Working collaboration with SDOs • Long-term goal – Review of and participation in NIS standardisation activities – Proposal of standards, via means of proposals for standardisation mandates.
  • 5. www.enisa.europa.eu ENISA and SDOs • Established collaboration agreements with: – ISO SC27 (Liaison) – ETSI (MoU) • Exchange of information of mutual interest • Organisation of joint meetings and workshops • ENISA to channel standardisation activities to ETSI, if appropriate • Exchange of working documents, within well defined frames • ENISA to nominate observers for ETSI Technical Bodies – CEN CENELEC (MoU) – ITU SG17 (MoU started!) • ENISA aligns key activities with the work of SDOs – ETSI TISPAN on CIIP, ESI on eID, CLOUD on cloud certification – CEN CENELEC on smart grids; – ISO SC 27 in the area of privacy;
  • 6. www.enisa.europa.eu Challenges from EU perspective • Lack of consistent strategy towards standards • Recognized shortcomings of the current approach • Need establishing a small number of key initiatives at EU level • Improve coordination between EU funded R&D and SDOs • Possible ‘vehicles’ for such a coordination: – ETSI CEN CENELEC CSCG – Horizon 2020
  • 7. www.enisa.europa.eu ETSI CEN-CENELEC Cyber Security Coordination Group (CSCG) • Give strategic advice to the technical committees of CEN, CENELEC and ETSI • Develop a gap analysis of European and International Standards on cyber security • Define of joint European requirements for European and International Standards on cyber security • Establish a European roadmap on standardization of cyber security • Act as contact point for all questions of EU institutions relating to standardization of cyber security • Suggest a joint US and European strategy for the establishment of a framework of International standards on cyber security
  • 8. www.enisa.europa.eu 8 CSCG Action Plan • #1 – Governance Framework • #2 – Common Understanding Of “Cyber Security” • #3 – Trust In The European Digital Environment • #4 – European Pki And Cryptographic Capabilities • #5 – European Cyber Security Label • #6 – European Cyber Security Requirements • #7 – European Cyber Security Research • #8 – Eu Industrial Forum On Cyber Security Standards • #9 – Eu Global Initiative On Cyber Security Standards
  • 9. www.enisa.europa.eu 9 2014: ETSI ESI “Algo paper” • ETSI TR 119 312 – Business Guidance on Cryptographic Suites • ETSI TS 119 312 – Cryptographic suites • ENISA reports 2013 – Recommended cryptographic measures – Algorithms, Key Sizes and Parameters • Collaboration 2014 –>
  • 10. www.enisa.europa.eu 10 European Union Agency for Network and Information Security Science and Technology Park of Crete P.O. Box 1309 71001 Heraklion Crete Greece Follow ENISA http://www.enisa.europa.eu