How To Discuss Cybersecurity In European Parliament



Similar documents
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

How To Write An Article On The European Cyberspace Policy And Security Strategy

OUTCOME OF PROCEEDINGS

Honourable members of the National Parliaments of the EU member states and candidate countries,

EU Cybersecurity: Ensuring Trust in the European Digital Economy

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Prof. Udo Helmbrecht

The UK cyber security strategy: Landscape review. Cross-government

How To Understand And Understand The European Priorities In Information Security

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Memorandum! Is Big Data the right recipe for Europe?

Internet Governance and Cybersecurity Patrick Curry MACCSA

Research Topics in the National Cyber Security Research Agenda

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

National Cyber Security Policy -2013

ENISA workshop on Security Certification of ICT products in Europe

National Cyber Security Strategy

Specific comments on Communication

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Cyber Security Review

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

National Cyber Security Strategies

The internet and digital technologies play an integral part

Cybersecurity and the Romanian business environment in the regional and European context

National Cyber Security Strategy of Afghanistan (NCSA)

EU policy on Network and Information Security and Critical Information Infrastructure Protection

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, Agenda

The EU approach to Cybersecurity and Cybercrime

Written Contribution of the National Association of Statutory Health Insurance Funds of

The European Response to the rising Cyber Threat

Cybersecurity in the Commonwealth: Setting the Stage

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

Cyber Security Strategy

Council of the European Union Brussels, 5 March 2015 (OR. en)

Cyber Security in EU: ENISA approach

ESKISP Conduct security testing, under supervision

Security & privacy in the cloud; an easy road?

Cybersecurity Strategy of the Republic of Cyprus

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CYSPA launch event - Turkey

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.

Cyber Security Strategy of Georgia

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

Priority III: A National Cyberspace Security Awareness and Training Program

Position Paper: Berlin, 31 March Legislative intentions to increase IT Security

Cyber Security Strategy

Partnership for Cyber Resilience

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Cyber Security for Railway Signalling

Smart Meters Executive Paper

Future cybersecurity threats and research needs.

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Cyber Security in EU: ENISA approach

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

S. ll IN THE SENATE OF THE UNITED STATES

TUSKEGEE CYBER SECURITY PATH FORWARD

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study

New challenges in Data privacy.

Cyber Security Strategy for Germany

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

The global challenge

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

What are you trying to secure against Cyber Attack?

How To Prevent Cyber Crime

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

- 'Improving Cyber Security in Europe, the way forward

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

BSA GLOBAL CYBERSECURITY FRAMEWORK

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

Guiding principles for security in a networked society

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

April 28, Dear Mr. Chairman:

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

CYSPA - EC projects supporting NIS

European Commission Per

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

An Overview of Cybersecurity and Cybercrime in Taiwan

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Financial Services and Technology Forum 10 July TOPIC: Cyber Security

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Lith Networking and Network Marketing Safety

POLICIES TO MITIGATE CYBER RISK

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

Transcription:

! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact that access control is not optimally managed or governed. If you see all of the attacks and the abuse of systems, and the general cybersecurity problem, most of them are related to access control, he said. He also indicated that whereas cybersecurity was initially a problem!! for the banking sector, it is now a major issue in a whole range of industries, ranging from utilities with smart metering, smart grids and smart tickets, to the public sector where there is increased need for efficiency and for databases to be opened up for easier administration, which creates risk. He also pointed out that cybersecurity is an increasing problem in the healthcare sector (electronic health records), while even in the media and telecoms sectors hacking is becoming more prevalent.!

Jakub Boratyński! Head of Unit H4 - Trust and Security, DG Connect, European Commission! Mr Boratyński reminded delegates of the economic and social benefits of the digital world and an open Internet, but admitted that cyber security incidents including cybercrime are on the rise globally, leading to the need for a comprehensive EU-wide vision. He outlined the key aspects of the Commission s proposal for a Directive on Network and Information Security (NIS). It provides for a NIS strategy and cooperation plan, and designation of NIS competent authorities that can! cooperate within a network at the EU level. Crucial is the ability to receive early warnings and conduct a coordinated response. In this respect, ENISA has an important role to play. Mr Boratyński summarised the stateof-play of the proposal, the negotiations are ongoing with the Council. The European Parliament is expected to vote in Plenary in March 2014. He concluded by mentioning the NIS Public-Private Platform, which will help ensure consistent implementation of the Directive. According to Mr Boratyński, the platform s working groups on risk management; information exchange and incident coordination; and secure ICT research and innovation are working well. First output guidance on risk management and information sharing is expected this year.!

Fredrik Erixon! Director of ECIPE - European Centre for International Political Economy! Mr Erixon s first point was that with the expansion of the global economy, cybersecurity is going to become vastly more important for companies to protect their assets, business models and client information. At the same time, given the vast amount of value being generated by data, cybersecurity regulations can themselves damage economic value. So we need to be very cautious and very aware of the! consequences that both cybersecurity attacks and the regulations to protect against cybersecurity attacks can have on the value generated on the market today, he explained. Mr Erixon s second point was that the quality of many of the so-called cybersecurity regulations currently active is quite poor. He suggested that there is a need for much more creativity and imagination to be shown, to enable the EU to take leadership in shaping international rules for what can be accomplished in this nexus between cybersecurity and industrial policy. He believes more attention should be focused on the extent to which cybersecurity regulators have the capacity to fracture and even destroy a lot of the economic value in modern supply chains.!

Achim Klabunde! Head of IT Policy Sector, European Data Protection Supervisor! Mr Klabunde focused on the topic of cybersecurity and privacy. His first point was that privacy needs cybersecurity. There is a massive increase in personal data collection and processing, and the increased value of data motivates attackers and drives the need for better security measures. The legislative response is a reform of the data protection regulations which try to make more comprehensive rules to strengthen! and clarify the security obligations of data controllers. His second point was that security measures themselves may endanger privacy. One approach is to collect as much data as possible and give it to law enforcement agencies who can then analyse the data to help identify potential cyber criminals. However, Mr Klabunde remarked that this has a risk of adverse consequences for individuals and is against the fundamental values of a free society. Any police investigation based on data must be based on our respect for fundamental rights which requires strict limitations to ensure that these rights are preserved. He concluded by looking at the cybersecurity domains, which he described as Network and Information Society (protect yourself), fighting cybercrime (investigate and prosecute) and cyber defence (defend and attack).!!

Bertrand Lathoud! Senior MTS, Information Security, IRM responsible, PayPal! Mr Lathoud set the scene by describing a world with complex infrastructures, complex patterns of usage of technologies, and complex threats, meaning that a simple solution to cybersecurity is impossible. It s also a world where cyber crime can be carried out from anywhere in the world, in an automated manner, and in a short timeframe. PayPal s response in 2007 was to push towards a broader! security strategy encompassing ecosystem resilience by investing in solutions that support protocols to make existing standards more robust. This, he said, is best achieved through open standards that can be implemented quickly by as many stakeholders as possible. If a sufficient level of protocol robustness is reached, then, Mr Lathoud said, it is like vaccination; the whole herd is protected. He gave the example of Domain-based Message Authentication, Reporting and Conformance (DMARC) which has been implemented to significantly reduce the number of phishing attempts against customers. In the US, 80% of all email providers are DMARC compliant, although this is not the case in Europe. Despite this, DMARC is a good example of how strengthening the ecosystem can have a direct impact on the security of users.!

Panel discussion Mr Schüpp opened the debate by asking how a fragmented approach to cybersecurity with every country dealing with the issue on its own can face threats of a global nature. Mr Boratyński emphasised that the NIS Directive is just one of a range of measures to be implemented to create a risk management culture throughout the EU. Mr Klabunde pointed out that the Directive follows a top-down approach by defining the overall framework, but a parallel bottom-up way to mandate cybersecurity is also feasible. An audience member asked to what level the NIS Directive is driven by protectionism. Mr Boratyński! replied that he does not see protectionism as an outcome of the proposal, which aims to create a level playing field. Mr Schüpp asked whether legislation has a role to level the playing field by demanding better standards. Mr Lathoud responded by saying that if legislation were to define a technical standard this could freeze innovation. A question from the floor was why hardware device manufacturers and software developers are excluded from the!

proposed NIS Directive. A delegate responded by saying that picking out hardware or software developers as liable would create enormous problems and restrictions. Another delegate asked about the reporting and processing of incidents. Mr Boratyński called for balance between resilience and security on the one hand, and activities which are aimed at identifying perpetrators on the other hand. Another question concerned the process ahead for the NIS Directive.! Mr Boratyński said that dialogue is continuing with member states, ENISA and the industry, especially at a higher level of technical detail, and he is aware of the divergent interests of different interested parties. Mr Erixon said it is important that the Directive does not adversely affect how companies can trade with each other, and believes it is important to understand the cost implications of regulations and what changes the costs are going to have on the market.! Sponsored by:! Media partner:!