SlideShare uma empresa Scribd logo
1 de 17
European Union Agency for Network and Information Security www.enisa.europa.eu
European priorities in
information security
Graeme Cooper
Head of Public Affairs Unit, ENISA
12th International InfoSec and Data Storage Conference,
26th September 2013, Sheraton Hotel, Sofia, Bulgaria
European Union Agency for Network and Information Security www.enisa.europa.eu 2
EU Cubersecurity Strategy - essential points
“An Open, Safe and Secure Cyberspace”
• The norms, principles and values that the EU upholds
offline, should also apply online.
• Cyberspace must be correctly protected:
– Governments have a significant role in ensuring a free
and safe cyberspace.
– The private sector owns and operates significant parts
of cyberspace and has a leading role.
• Outside the EU, governments may misuse cyberspace for
surveillance and control.
– The EU can counter this situation by promoting freedom
online and ensuring respect of fundamental rights
online.
European Union Agency for Network and Information Security www.enisa.europa.eu 3
Economic Arguments
• By completing the Digital Single Market, Europe could boost its
GDP by almost €500 billion a year.
• For new connected technologies to take off citizens will need
trust and confidence.
– Currently, Europeans are not confident in their ability to use
the Internet for banking or purchases.
– They are also reluctant to disclose personal information.
– Across the EU, more than one in ten Internet users has been
a victim of online fraud.
• The EU economy is already affected by cybercrime activities,
economic espionage and state-sponsored activities are new
threats.
European Union Agency for Network and Information Security www.enisa.europa.eu 4
The Principles
• The strategy proposes key principles to guide the EU and
international approach:
– The EU's core values apply as much in the digital as in
the physical world.
– Fundamental rights, freedom of expression, personal
data and privacy should be protected.
– The Internet should be accessible to all citizens.
– The digital world must be subject to democratic and
efficient multi-stakeholder governance.
– Ensuring security is a shared responsibility.
European Union Agency for Network and Information Security www.enisa.europa.eu 5
Strategic Priorities
• The Five strategic objectives of the
strategy are as follows:
– Achieving cyber resilience
– Drastically reducing cybercrime
– Developing cyberdefence policy and capabilities related
to the Common Security and Defence Policy (CSDP)
– Developing the industrial and technological resources
for cybersecurity
– Establishing a coherent international cyberspace policy
for the European Union and promoting core EU values
ENISA explicitly called upon.
European Union Agency for Network and Information Security www.enisa.europa.eu 6
Achieving Cyber Resilience
• Introduces ENISA and explains the policy on NIS.
• Makes reference to articles 13a & 13b.
• Introduces the legislative proposal.
• Stresses the importance of the following:
– The establishment of a cybersecurity culture to enhance
business opportunities and competitiveness.
– Reporting significant incidents to the national NIS
competent authorities.
– Exchange of information between National NIS
competent authorities and other regulatory bodies.
– Recognises that exercises at EU level are essential to
stimulate cooperation among the MS and the private
sector.
European Union Agency for Network and Information Security www.enisa.europa.eu 7
The Legislative Proposal
• Key points:
– Will help establish common minimum requirements for
NIS at national level.
– Requires Member States to designate national
competent authorities for NIS, set up a competent CERT
and adopt a national NIS strategy and a national NIS
cooperation plan.
– Explains the role of the CERT EU regarding the EU
institutions, agencies and bodies.
– Requires the establishment of coordinated prevention,
detection, mitigation and response mechanisms.
– Requires the private sector to develop, at a technical
level, its own cyber resilience capacities and share best
practices across sectors.
European Union Agency for Network and Information Security www.enisa.europa.eu 8
Achieving Cyber Resilience (1 of 2)
• In the area of cyber resilience, the EC asks ENISA to:
– Assist the Member States in developing strong national
cyber resilience capabilities.
– Examine in 2013 the feasibility of Computer Security
Incident Response Team(s) for Industrial Control
Systems (ICS-CSIRTs) for the EU.
– Continue supporting the Member States and the EU
institutions in carrying out regular pan-European cyber
incident exercises.
European Union Agency for Network and Information Security www.enisa.europa.eu 9
Achieving Cyber Resilience (2 of 2)
• Specifically in terms of raising awareness, the Commission
asks ENISA to:
– Propose in 2013 a roadmap for a "Network and
Information Security driving licence".
– Support a cybersecurity championship in 2014, where
university students will compete in proposing NIS
solutions.
European Union Agency for Network and Information Security www.enisa.europa.eu 10
European Cybersecurity Month 2013
http://cybersecuritymonth.eu/
European Union Agency for Network and Information Security www.enisa.europa.eu 11
Developing Resources
• There is a risk that Europe becomes excessively dependent
on ICT and on security solutions developed outside its
frontiers.
• Hardware and software components used in critical
services and infrastructure must be trustworthy, secure
and guarantee the protection of personal data.
• In order to mitigate this risk, the strategy proposes two
action areas:
– Promoting a Single Market for cybersecurity products
– Fostering R&D investments and innovation
European Union Agency for Network and Information Security www.enisa.europa.eu 12
Single Market for Products
• A high level of security can only be ensured if all in the
value chain make security a priority.
• The strategy aims to increase cooperation and
transparency about security in ICT products:
– It calls for the establishment of a platform to identify
good cybersecurity practices across the value chain.
• COM will support the development of security standards
and assist with EU-wide voluntary certification schemes.
– Cloud computing and data protection.
– critical economic sectors - Industrial Control Systems,
energy and transport infrastructure.
European Union Agency for Network and Information Security www.enisa.europa.eu 13
R&D and Innovation
• R&D should fill technology gaps in ICT security and prepare
for the next generation of security.
• The Horizon 2020 Framework Programme for Research and
Innovation will be launched in 2014:
– There are specific objectives for trustworthy ICT as well
as for combating cyber-crime.
• Specific attention will be drawn at EU level to optimising
and better coordinating various funding programmes
European Union Agency for Network and Information Security www.enisa.europa.eu 14
Developing Resources
• The Commission asks ENISA to:
– Develop, in cooperation with relevant stakeholders,
technical guidelines and recommendations for the
adoption of NIS standards and good practices in the
public and private sectors.
– Collaborate with Europol to identify emerging trends
and needs in view of evolving cybercrime and
cybersecurity patterns so as to develop adequate digital
forensic tools and technologies.
European Union Agency for Network and Information Security www.enisa.europa.eu 15
Further Involvement of ENISA
• Although ENISA is not explicitly mentioned in the other
strategic priorities, there is clearly a role for the Agency.
• The EU Internal Security Strategy explains how ENISA
should collaborate with the recently established EU Cyber
Crime Centre.
• We have a role in creating a strong culture of NIS
throughout the EU.
• This can only be achieved by bringing communities
together and ensuring that information on NIS is shared
between such communities in an appropriate manner.
European Union Agency for Network and Information Security www.enisa.europa.eu 16
Concluding Remarks
• Complex ICT systems keep our economies running in key sectors
such as finance, health, energy, etc.
• Many business models are built on the uninterrupted availability
of the Internet and the smooth functioning of information
systems
• EC Recognises the importance of ICT in contributing to EUs
economic growth and its role as a critical resource for all
economic sectors
• ENISA is already well established and
contributing in many of the areas
described in the EU proposal for an
EU cybersecurity strategy.
www.enisa.europa.eu
Follow ENISA:
European Union Agency for Network and Information Security
Thank you.
Graeme Cooper, Head of Public Affairs Unit, ENISA
ENISA
European Union Agency for Network and Information Security
Science and Technology Park of Crete (ITE)
Vassilika Vouton, 700 13, Heraklion, Greece
Athens Office
1 Vass. Sofias & Meg. Alexandrou
Marousi 151 24, Athens, Greece

Mais conteúdo relacionado

Mais procurados

Summer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on securitySummer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on security
Nikolaos Georgitsopoulos
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
segughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
segughana
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OK
MARIUS EUGEN OPRAN
 

Mais procurados (15)

Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
 
Summer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on securitySummer school 2017 giannakoula _european agenda on security
Summer school 2017 giannakoula _european agenda on security
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OK
 
Steve Purser
Steve Purser Steve Purser
Steve Purser
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Cybersecurity nl
Cybersecurity nlCybersecurity nl
Cybersecurity nl
 
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIESEIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 
Dataistheborder
DataistheborderDataistheborder
Dataistheborder
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 

Semelhante a European priorities in information security

Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
Yury Chemerkin
 

Semelhante a European priorities in information security (20)

SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
 
Granada declaration - European Digital Agenda
Granada declaration - European Digital AgendaGranada declaration - European Digital Agenda
Granada declaration - European Digital Agenda
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
Digital single market
Digital single marketDigital single market
Digital single market
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
Dantemtc a rouby_european_policies
Dantemtc a rouby_european_policiesDantemtc a rouby_european_policies
Dantemtc a rouby_european_policies
 
Digital europeprogram2021 2027
Digital europeprogram2021 2027Digital europeprogram2021 2027
Digital europeprogram2021 2027
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, ItalyWISER @Ferma Forum, 4-7 October 2015, Venice, Italy
WISER @Ferma Forum, 4-7 October 2015, Venice, Italy
 
Enisa and cyber security standards
Enisa and cyber security standardsEnisa and cyber security standards
Enisa and cyber security standards
 
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
 

Mais de European Union Agency for Network and Information Security (ENISA)

Mais de European Union Agency for Network and Information Security (ENISA) (6)

The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Power Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications SectorPower Supply Dependencies in the Electronic Communications Sector
Power Supply Dependencies in the Electronic Communications Sector
 
Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System Resilience of the Interdomain Routing System
Resilience of the Interdomain Routing System
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
 
Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management Trustworthy infrastructure for personal data management
Trustworthy infrastructure for personal data management
 
Enisa internet mapping project-20130523
Enisa internet mapping project-20130523Enisa internet mapping project-20130523
Enisa internet mapping project-20130523
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

European priorities in information security

  • 1. European Union Agency for Network and Information Security www.enisa.europa.eu European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
  • 2. European Union Agency for Network and Information Security www.enisa.europa.eu 2 EU Cubersecurity Strategy - essential points “An Open, Safe and Secure Cyberspace” • The norms, principles and values that the EU upholds offline, should also apply online. • Cyberspace must be correctly protected: – Governments have a significant role in ensuring a free and safe cyberspace. – The private sector owns and operates significant parts of cyberspace and has a leading role. • Outside the EU, governments may misuse cyberspace for surveillance and control. – The EU can counter this situation by promoting freedom online and ensuring respect of fundamental rights online.
  • 3. European Union Agency for Network and Information Security www.enisa.europa.eu 3 Economic Arguments • By completing the Digital Single Market, Europe could boost its GDP by almost €500 billion a year. • For new connected technologies to take off citizens will need trust and confidence. – Currently, Europeans are not confident in their ability to use the Internet for banking or purchases. – They are also reluctant to disclose personal information. – Across the EU, more than one in ten Internet users has been a victim of online fraud. • The EU economy is already affected by cybercrime activities, economic espionage and state-sponsored activities are new threats.
  • 4. European Union Agency for Network and Information Security www.enisa.europa.eu 4 The Principles • The strategy proposes key principles to guide the EU and international approach: – The EU's core values apply as much in the digital as in the physical world. – Fundamental rights, freedom of expression, personal data and privacy should be protected. – The Internet should be accessible to all citizens. – The digital world must be subject to democratic and efficient multi-stakeholder governance. – Ensuring security is a shared responsibility.
  • 5. European Union Agency for Network and Information Security www.enisa.europa.eu 5 Strategic Priorities • The Five strategic objectives of the strategy are as follows: – Achieving cyber resilience – Drastically reducing cybercrime – Developing cyberdefence policy and capabilities related to the Common Security and Defence Policy (CSDP) – Developing the industrial and technological resources for cybersecurity – Establishing a coherent international cyberspace policy for the European Union and promoting core EU values ENISA explicitly called upon.
  • 6. European Union Agency for Network and Information Security www.enisa.europa.eu 6 Achieving Cyber Resilience • Introduces ENISA and explains the policy on NIS. • Makes reference to articles 13a & 13b. • Introduces the legislative proposal. • Stresses the importance of the following: – The establishment of a cybersecurity culture to enhance business opportunities and competitiveness. – Reporting significant incidents to the national NIS competent authorities. – Exchange of information between National NIS competent authorities and other regulatory bodies. – Recognises that exercises at EU level are essential to stimulate cooperation among the MS and the private sector.
  • 7. European Union Agency for Network and Information Security www.enisa.europa.eu 7 The Legislative Proposal • Key points: – Will help establish common minimum requirements for NIS at national level. – Requires Member States to designate national competent authorities for NIS, set up a competent CERT and adopt a national NIS strategy and a national NIS cooperation plan. – Explains the role of the CERT EU regarding the EU institutions, agencies and bodies. – Requires the establishment of coordinated prevention, detection, mitigation and response mechanisms. – Requires the private sector to develop, at a technical level, its own cyber resilience capacities and share best practices across sectors.
  • 8. European Union Agency for Network and Information Security www.enisa.europa.eu 8 Achieving Cyber Resilience (1 of 2) • In the area of cyber resilience, the EC asks ENISA to: – Assist the Member States in developing strong national cyber resilience capabilities. – Examine in 2013 the feasibility of Computer Security Incident Response Team(s) for Industrial Control Systems (ICS-CSIRTs) for the EU. – Continue supporting the Member States and the EU institutions in carrying out regular pan-European cyber incident exercises.
  • 9. European Union Agency for Network and Information Security www.enisa.europa.eu 9 Achieving Cyber Resilience (2 of 2) • Specifically in terms of raising awareness, the Commission asks ENISA to: – Propose in 2013 a roadmap for a "Network and Information Security driving licence". – Support a cybersecurity championship in 2014, where university students will compete in proposing NIS solutions.
  • 10. European Union Agency for Network and Information Security www.enisa.europa.eu 10 European Cybersecurity Month 2013 http://cybersecuritymonth.eu/
  • 11. European Union Agency for Network and Information Security www.enisa.europa.eu 11 Developing Resources • There is a risk that Europe becomes excessively dependent on ICT and on security solutions developed outside its frontiers. • Hardware and software components used in critical services and infrastructure must be trustworthy, secure and guarantee the protection of personal data. • In order to mitigate this risk, the strategy proposes two action areas: – Promoting a Single Market for cybersecurity products – Fostering R&D investments and innovation
  • 12. European Union Agency for Network and Information Security www.enisa.europa.eu 12 Single Market for Products • A high level of security can only be ensured if all in the value chain make security a priority. • The strategy aims to increase cooperation and transparency about security in ICT products: – It calls for the establishment of a platform to identify good cybersecurity practices across the value chain. • COM will support the development of security standards and assist with EU-wide voluntary certification schemes. – Cloud computing and data protection. – critical economic sectors - Industrial Control Systems, energy and transport infrastructure.
  • 13. European Union Agency for Network and Information Security www.enisa.europa.eu 13 R&D and Innovation • R&D should fill technology gaps in ICT security and prepare for the next generation of security. • The Horizon 2020 Framework Programme for Research and Innovation will be launched in 2014: – There are specific objectives for trustworthy ICT as well as for combating cyber-crime. • Specific attention will be drawn at EU level to optimising and better coordinating various funding programmes
  • 14. European Union Agency for Network and Information Security www.enisa.europa.eu 14 Developing Resources • The Commission asks ENISA to: – Develop, in cooperation with relevant stakeholders, technical guidelines and recommendations for the adoption of NIS standards and good practices in the public and private sectors. – Collaborate with Europol to identify emerging trends and needs in view of evolving cybercrime and cybersecurity patterns so as to develop adequate digital forensic tools and technologies.
  • 15. European Union Agency for Network and Information Security www.enisa.europa.eu 15 Further Involvement of ENISA • Although ENISA is not explicitly mentioned in the other strategic priorities, there is clearly a role for the Agency. • The EU Internal Security Strategy explains how ENISA should collaborate with the recently established EU Cyber Crime Centre. • We have a role in creating a strong culture of NIS throughout the EU. • This can only be achieved by bringing communities together and ensuring that information on NIS is shared between such communities in an appropriate manner.
  • 16. European Union Agency for Network and Information Security www.enisa.europa.eu 16 Concluding Remarks • Complex ICT systems keep our economies running in key sectors such as finance, health, energy, etc. • Many business models are built on the uninterrupted availability of the Internet and the smooth functioning of information systems • EC Recognises the importance of ICT in contributing to EUs economic growth and its role as a critical resource for all economic sectors • ENISA is already well established and contributing in many of the areas described in the EU proposal for an EU cybersecurity strategy.
  • 17. www.enisa.europa.eu Follow ENISA: European Union Agency for Network and Information Security Thank you. Graeme Cooper, Head of Public Affairs Unit, ENISA ENISA European Union Agency for Network and Information Security Science and Technology Park of Crete (ITE) Vassilika Vouton, 700 13, Heraklion, Greece Athens Office 1 Vass. Sofias & Meg. Alexandrou Marousi 151 24, Athens, Greece