European Commission Per
|
|
|
- Augustus Farmer
- 10 years ago
- Views:
Transcription
1 Post Bits of Freedom Bank M +31(0) Postbus KvK E [email protected] 1001 ES Amsterdam W European Commission Per [email protected] Subject Public Consultation Improving Network and Information Security (NIS) in Europe Amsterdam 11 October 2012 Dear Sir, Madam, Bits of Freedom welcomes the opportunity to provide input to the Public Consultation on Improving Network and Information Security (NIS) in Europe. We submitted our answers to the online questionnaire but would like to provide you with additional comments in this letter. Improving cybersecurity in Europe Stuxnet and Diginotar are examples of serious information security incidents that shook up Europe over the last couple of years. As Europe and its Member States become more and more dependent on information and communications technology (ICT) systems, they become more vulnerable to attacks on such systems. Cybersecurity therefore rightfully is high on the European political agenda. However, if we focus too much on incidents such as these, cybersecurity policy will be the result of emotional reactions: we jump from incident to incident, not taking the time to devise structural solutions. Meanwhile, internet freedom is at risk, for example by considering extensive monitoring of internet traffic, and we run the risk of undermining the most important infrastructure of the 21st century: the internet. Bits of Freedom believes that Europe deserves better cybersecurity. We are also convinced that smart and focused measures can significantly improve our cybersecurity. We explain this below. 1 of 5
2 Basic principles of European cybersecurity policy a. Cybersecurity is personal security. Cybersecurity policy often focuses on the protection of vital infrastructures, like power plants and water facilities. But cybersecurity also concerns another important topic: the protection of civilians and their most valuable and intimate information. It would be a disaster if the sensitive and valuable data of millions of Europeans (such as communications, medical and location data) would be inadvertently exposed. b. Cybersecurity must respect fundamental rights. Cybersecurity measures that are regularly suggested often affect our fundamental rights. For example, an 'internet kill switch' would limit the fundamental right to communication freedom. Mass surveillance of internet traffic severely limits our privacy. Such measures are therefore unacceptable: the European Court of Human Rights ruled on different occasions that the very essence of fundamental rights may not be impaired. As a consequence, the necessity, proportionality, subsidiarity and effectiveness of new cybersecurity measures must always be demonstrated beforehand. This means that such measures must be tailored to the issue they attempt to solve. c. Cybersecurity requires transparency. Cybersecurity policy can have far reaching societal consequences for, amongst others, fundamental rights and the functioning of the internet. For that very reason, public oversight of cybersecurity policy is a necessity and transparency in this field is mandatory. Policy must be based on real and verifiable threat and risk analyses (both before implementation of the policy and periodically thereafter) and must be focused on the specific risk it attempts to address. d. Absolute cybersecurity does not exist. Even though cybersecurity is an important policy goal, absolute security does not exist. Security in general is by definition the result of a cost-benefit analysis. In the field of cybersecurity, this analysis is informed by the fact that a small group of people with relatively little money can already cause immense damage, for example by developing advanced malware like Stuxnet. Of course, risks can be prevented as much as possible by providing basic security measures, by spreading risks as much as possible, and by providing fall-back mechanisms. Nonetheless, we must accept that even then, certain cybersecurity risks cannot be excluded, as the costs of prevention are simply too high (both in euros and the impact that preventative measures would have on our fundamental freedoms). 2 of 5
3 Eight measures for modern cybersecurity policy 1. Cybersecurity policy must focus on personal security. Over the last couple of years European and national legislation increasingly require the central storage of sensitive data of millions of Europeans (such as fingerprints, car license numbers, telephone and -traffic data and location data). The access restrictions to this kind of data are often insufficient, as is illustrated by the situation in the Netherlands, where data of telecommunications subscribers is easily accessible to law enforcement officers and requested almost three million times a year. This must change: principles like data minimization and decentralization can prevent data breaches, simply because there is no or insufficient data to be compromised. Governments must therefore also store less data: the necessity of storage and the purpose thereof must always be proven beforehand. Moreover, data must be destroyed when storage is no longer necessary. Governments must further limit the access to data as much as possible and implement security by design and privacy by design principles in their IT-systems. In order to limit vulnerabilities, governments must ensure a healthy diversity in IT-systems when buying products and services. The principles mentioned in this paragraph equally apply to the private sector: the storage of-, and access to private data by such companies must be restricted and the security of systems must be higher. 2. Cybersecurity requires investment in knowledge and capacity, not in new authorities. Responses to cyberincidents are often inadequate due to lack of knowledge and capacity. Europe and its Member States must therefore invest in extra people with relevant expertise and the training of current staff. For example, governments must attract more staff with a technical background and ensure that law enforcement officers are trained in digital investigation methods. Investments in relevant education and scientific research are also necessary to ensure that knowledge of cybersecurity can be further developed and safeguarded in the future. 3. Internet users must be able to protect themselves. Europe and its Member States must ensure that internet users (including many organizations in the public and private sector) can protect themselves against cyber threats. The tools and support that are currently available to internet users is often insufficient. Meanwhile, many incidents are caused by basic vulnerabilities that can be prevented by taking basic security measures, like regular software-updates. Cybersecurity therefore begins with education on such measures, the promotion of usage of cybersecurity technology, like encryption software and anonymisation technology, and the development of secure software. This means that Europe and its Member States may not require backdoors in encryption technology and must not support the development thereof. 3 of 5
4 4. Europe and its Member States must give the right example. Lack of control or large dependence on third parties in information management creates a considerable security risk and undermines the credibility of cybersecurity policy. Europe and its Member States therefore need additional knowledge and capacity in the area of ICT, so that they can control their own infrastructures and can better estimate the consequences and risks of envisaged policies. 5. Outsourcing cybersecurity must be the exception. Europe and its Member States have the important role to ensure a safe and secure information society. Ensuring this remains at the core of their task. Precisely because of the large societal interests at stake, governments must be reluctant to support self regulation and public-private partnerships. This means that Europe and its Member States can only invoke the assistance of private parties in the field of cybersecurity if (i) they demonstrate the necessity thereof beforehand, (ii) formulate the conditions for cooperation, (iii) are fully transparent about this cooperation, and (iv) - where fundamental rights are concerned guarantee parliamentary control. 6. The exchange of incident information must be stimulated. Public and private organizations are for their safety partly dependent on the information they receive from others: they can better secure their information systems on the basis of information on known threats and vulnerabilities. Europe and its Member States must promote the exchange of such information, for example via platforms for the exchange of vulnerabilities, attack patterns and infected IP-addresses. Where possible, such information must be publicly shared. Such systems must have built in safeguards that prevent the exchange of personal data, the abuse of this information and errors in the exchanged information. Europe and its Member States must also ensure that knowledge on vulnerabilities in information technologies are publicized as soon as possible. Finally, they must promote reporting of vulnerabilities through drafting guidelines for responsible disclosure. 7. Data and security breaches must be notified. Data and security breaches lead to identity fraud and loss of trust in information technology. Europe, its Member States and private parties must therefore be legally required to report unauthorized access to personal data to stakeholders. A public register for data and security breaches must enable public and private parties to learn from past mistakes and create insight in current threats. 8. Supervisory authorities must be able to act effectively. European data protection authorities monitor the protection of personal data. Other supervisory authorities, like the Dutch National Cyber Security Centre (NCSC), focus on increasing resilience in the digital domain. These authorities must be able to determine whether a particular cyberincident forms a significant risk for our information security and must, if necessary, be able to respond in an expedient and effective 4 of 5
5 manner. That means that these authorities must have sufficient budget and powers. In addition, (international) cooperation between supervisory authorities must be promoted. About Bits of Freedom Bits of Freedom is a Dutch digital rights organization, focusing on privacy and communication freedom in the digital age. We fight for an internet that is open to everyone, where everyone can continue sharing information, where private communication remains private and where lawful information remains accessible. We combine a broad range of legal and technical experience, a constructive lobby where possible, and sharp action where necessary. Bits of Freedom is based in Amsterdam, the Netherlands. We are active both on the national and European level and are one of the founders and a member of European Digital Rights initiative (EDRi). We trust to have informed you sufficiently. Please do not hesitate to contact me should you wish to discuss the content of this contribution in more detail. Yours sincerely, Simone Halink Bits of Freedom 5 of 5
The National Cyber Security Strategy (NCSS) Success through cooperation
The National Cyber Security Strategy (NCSS) Success through cooperation 1. Introduction The Netherlands stands for safe and reliable ICT 1 and the protection of the openness and freedom of the Internet.
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
Cyber security in an organization-transcending way
Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
5581/16 AD/NC/ra DGE 2
Council of the European Union Brussels, 21 April 2016 (OR. en) Interinstitutional File: 2013/0027 (COD) 5581/16 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: TELECOM 7 DATAPROTECT 6 CYBER 4 MI 37 CSC 15
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
the Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 7.2.2013 COM(2013) 48 final 2013/0027 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE
IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE Commanders, leaders, and managers are responsible for ensuring that Information Assurance/Cybersecurity is part of all Army operations, missions and
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, XXX [ ](2012) XXX draft Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal.
Dear Commissioner Malmström, As you know, we have been closely involved in consultations with the European Commission with regard to the impact assessment on, and probable review of, the Data Retention
The internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015
Cyber Security Auditing for Credit Unions ACUIA Fall Meeting October 7-9, 2015 Topics Introduction Cyber Security Auditing Program Discuss an effective and compliant Cyber Security Auditing Program from
Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act
Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act On 1 January 2016, the Dutch Data Breach Notification Act will enter into force. The Dutch DPA issued Guidelines
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Do you have a private life at your workplace?
Do you have a private life at your workplace? Privacy in the workplace in EC institutions and bodies Giovanni Buttarelli In the course of his supervisory activities, the EDPS has published positions on
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
BIG DATA AND CYBERSECURITY:
BIG DATA AND CYBERSECURITY: Multi Stakeholder Threats and Opportunities A US Speakers Program Embassy of the United States, Serbia September 20-25, 2015 Anne C. Bader Founder The International Cybersecurity
National Cyber Security Strategies: United States
National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
EU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
Cyber Security and the Board of Directors
Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
EU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
Design of Database Security Policy In Enterprise Systems
Design of Database Security Policy In Enterprise Systems by Krishna R Singitam Database Architect Page 1 of 10 Table of Contents 1. Abstract... 3 2. Introduction... 3 2.1. Understanding the Necessity of
ROADMAP. Proposal on a European Strategy for Internet Security
TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
PROPOSED INTERPRETIVE NOTICE
August 28, 2015 Via Federal Express Mr. Christopher J. Kirkpatrick Secretary Office of the Secretariat Commodity Futures Trading Commission Three Lafayette Centre 1155 21st Street, N.W. Washington, DC
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
COUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Any Colour You Like The History (and Future?) of Communications Security Policy
Any Colour You Like The History (and Future?) of Communications Security Policy NYU Security Seminar, New York 22.04.14 https://www.axelarnbak.nl 2013/14 Fellow Berkman Center & CITP, IviR University of
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
How To Protect Your Computer From Attack
FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
Cyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]
OECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
The Netherlands response to the public consultation on the revision of the European Commission s Impact Assessment guidelines
The Netherlands response to the public consultation on the revision of the European Commission s Impact Assessment guidelines Introduction Robust impact assessment is a vital element of both the Dutch
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
RESPONSE TO FCC CONSULTATION. Notice of Proposed Rulemaking on Protecting and Promoting the Open Internet GN Docket No. 14-28
RESPONSE TO FCC CONSULTATION Notice of Proposed Rulemaking on Protecting and Promoting the Open Internet GN Docket No. 14-28 Introduction European Digital Rights (EDRi) is an association of 36 digital
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
