Prof. Udo Helmbrecht



Similar documents
How To Write An Article On The European Cyberspace Policy And Security Strategy

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

How To Understand And Understand The European Priorities In Information Security

ENISA and Cloud Security

Cooperation in Securing National Critical Infrastructure

Cyber Security in Europe

Achieving Global Cyber Security Through Collaboration

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA.

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

Cloud and Critical Information Infrastructures

ENISA and Cloud Security

Cyber Security in EU: ENISA approach

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI All rights reserved

Cyber Security in EU: ENISA approach

Network and Information Security Legislation in the EU

Annual Incident Reports 2011

Achieving Global Cyber Security Through Collaboration

EU policy on Network and Information Security and Critical Information Infrastructure Protection

Cyber Europe Key Findings and Recommendations

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

European Union Agency for Network and Information Security ENISA ANNUAL REPORT

DS : Trust eservices. The policy context: eidas Regulation

Cyber security initiatives in European Union and Greece The role of the Regulators

Technical Guideline on Security Measures

EU Cybersecurity: Ensuring Trust in the European Digital Economy

ENISA Work programme

ENISA and Cloud Security

Implementation of eidas through Member States Supervisory Bodies

NIST-Workshop 10 & 11 April 2013

Technical Guideline on Security Measures

Internet Governance and Cybersecurity Patrick Curry MACCSA

WORK PROGRAMME NOVEMBER 2012

How To Discuss Cybersecurity In European Parliament

OUTCOME OF PROCEEDINGS

Cyber Security for Railway Signalling

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?

Our Commitment to Information Security

Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security

National Cyber Security Strategies

VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence

Electronic Signatures in Norway Supervision and Legal Aspects

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

National Cyber Security Strategy

Council of the European Union Brussels, 5 March 2015 (OR. en)

Electronic signature and compliance assurance: what s new?

Cyberspace Situational Awarness in National Security System

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

ICS-SCADA testing and patching: Recommendations for Europe

Helmut Wacket Head of Oversight Division. Cybersecurity: regulatory framework and central bank initiatives in the EU

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

CYBER SECURITY FOUNDATION - OUTLINE

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

CYSPA - EC projects supporting NIS

2012 IAS CONFERENCE. Case Study N 2: Monitoring EU LAW Implementation. Pascal Hallez René Scholzen 12 October 2012

STANDARDISIERUNG FÜR EIDAS IM MANDATE/460

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Honourable members of the National Parliaments of the EU member states and candidate countries,

Cyber Security Review

Ofcom guidance on security requirements in sections 105A to D of the Communications Act 2003

CESG Certification of Cyber Security Training Courses

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

Technical Guideline for Minimum Security Measures

ESKISP Conduct security testing, under supervision

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

BSA GLOBAL CYBERSECURITY FRAMEWORK

Follow the trainer s instructions and explanations to complete the planned tasks.

EBA s regulatory work on payments. Geoffroy Goffinet PAYMENT SYSTEMS MARKET EXPERT GROUP 03/12/2015

ETSI TS V2.1.1 ( )

COMMISSION REGULATION (EU) No /.. of XXX

Cybersecurity Strategy of the Republic of Cyprus

National Cyber Security Strategies. Practical Guide on Development and Execution

ETSI EN V2.2.2 ( )

Standards for Cyber Security

What legal aspects are needed to address specific ICT related issues?

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Transcription:

Prof. Udo Helmbrecht

Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for Network and Information Security

From Policy to Implementation. ENISA Supporting Policy Implementation 1 EU Policy context 2 Incident reporting activities 3 New activities linked to eidas regulation 4 Proposed NIS directive and ENISA future tasks 5 Proposed data protection regulation 3

EU Policy Context Cybersecurity strategy, regulations and directives

EU Policy context (1) EU Cyber Security Strategy JOIN(2013)1 A Digital Single Market Strategy for Europe COM(2015) 192 final CONVENTION ON CYBERCRIME Budapest, 23.XI.2001 5

EU Policy context (2) Proposal for a reform of the data protection Regulation COM(2012)11 Proposal for a Network & Information Security Directive - COM(2013)48 Proposal for an EU Connected Continent Regulation - COM(2013) 627 Electronic identification and trust services for electronic transactions in the internal market REGULATION (EU) No 910/2014 6

Incident reporting activities Article 4 of the eprivacy Directive (2002/58/EC) Article 13a of the Telecom Framework Directive (2009/140/EC)

Incident Reporting for the Telecom Sector - Mandated in Article 13a of the Telecom Package Framework Directive High number of incidents; limited information Reporting contributes to transparency ex-post incident analysis Article 13a of Telecom Package NRA Expert Group (EU and EFTA) & EC It issues non-binding technical guidelines for MS Tested over 4 years of reporting Other incident reporting schemes include Article 4 on personal data breaches (Telecoms) Article 19 on breaches of TSP services (eidas) Draft NIS Directive (covering more sectors) 8

Good practices and recommendations Enhance the baseline security level Sectorial approach List security measures and their level of applicability Validation by experts Objectives of these recommendations Reduce the existing needs and gaps Addressed to one or several stakeholders Can be high level or very technical 9

Activities linked to eidas regulation

Regulation 910/2014 on electronic identification and trust services (eidas) The role of ENISA Supporting and providing guidelines for trust service providers (TSPs) - Guidelines on risk assessment and recommendations for incident risk mitigation - Auditing framework for trust services overview of the dedicated means of auditing for TSPs Ongoing activities Analysis of relevance and compliance of standards related to TSPs - covering also mandate M460 "Rationalised Framework for electronic signature - assisting the EC in developing implementing acts Strategy analysis for introduction of qualified website authentication certificates (QWACs) - Promoting consumer confidence in the web authentication market Article 19 of the eidas Regulation: Incident reporting for Trust Service Providers 11

Supporting the creation of a Trust Services Forum Regulators & supervisors Context Entry into force of Regulation 910/2014 Development of secondary legislation Goal Explain to stakeholders the developments in the area of eidas Given them the opportunity to discuss with regulators on important areas Forum Topics Conformity assessment bodies & auditors Developments in the eidas Regulation and the related standards Certification of qualified electronic signatures Supervision of trust services providers Conformity assessment of TSPs Introducing in the market the new trust services Security measures and incident reporting for TSPs Trust services providers & cards manufactures 12

ENISA in article 19 of eidas ENISA administers an expert group Scope is Article 19 etrust services providers Main topic is security breach reporting (par 19.2) Goal is to develop non-binding technical guidelines for national authorities on article 19 (to support their work) Liaising with relevant industry groups and supported by EC Simple, streamlined, harmonized proposals that fit existing national structures/authorities needs - Security practices (par 19.1) are relevant; this group will not establish standards or new practices but liaise with existing standards and ongoing work Working with experts from these national authorities 13

Ongoing work on article 19 Guidelines for incident reporting Final document is expected by end of October 2015 - Lists common threats, vulnerabilities, attack scenarios - What is a significant incident? - A notification template for TSPs - An annual summary reporting template - Thresholds for annual summary reporting - A template for questions to ask the reporting party (secondary report, causes) Next steps End 2015 - functional specifications to extend Online Incident Reporting Tool Spring 2016 - pilot Online Incident Reporting Tool with authorities 1/1/2017 - Authorities are capable of submitting their national reports using OIRT 14

Proposed NIS directive Future tasks for ENISA

Role of ENISA Cooperation with competent authorities to define the scope of reporting per sector/area in terms of affected services and stakeholders. Input into technical implementing measures affecting certain sectors. Contribution to the network of competent authorities and the trusted information sharing mechanism. Facilitation of NIS contingency planning, through the pan European exercises and risk assessment. Contribution to education, awareness raising and training programs Review and tracking of the impact of security measures on market operators and proposition of modifications to reflect the current risk levels. Assistance to the Commission in reviewing the impact of the proposed Directive on NIS. 16

The Legislative Proposal Key points are as follows: Will help establish common minimum requirements for NIS at national level. Requires Member States to designate national competent authorities for NIS, set up a competent CERT and adopt a national NIS strategy and a national NIS cooperation plan. Explains the role of the CERT EU regarding the EU institutions, agencies and bodies. Requires the establishment of coordinated prevention, detection, mitigation and response mechanisms. Requires the private sector to develop, at a technical level, its own cyber resilience capacities and share best practices across sectors. 17

The Legislative Proposal Opportunities The legislative proposal correctly leaves a lot of room for HOW articles are implemented. An example is provided by Article 1: ENISA will work together with the Member States and the private sector to identify the optimal implementation strategies. This is the approach we used for Article 13a. Proposal available here: http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security 18

Securing personal data in the proposed data protection framework

Personal data protection requires security protection measures Personal data breach notification is stipulated in the: eprivacy directive (2002/58/EC), for the electronic communication sector proposed data protection regulation, extended to other sectors Appropriate technological protective measures applicable to the notification in COM Regulation 611/2013 on the measures applicable to the notification - Notification flow is different in case of implemented appropriate technological protection measures - i.e. notification of a personal data breach to a subscriber or individual concerned shall not be required in such case, according to art 4, COM Regulation 611/2013 Indicative list of appropriate technological protection measures (COM reg. 611/2013) ENISA is supporting EC in establishing the indicative list of protective measures - Guidelines on algorithms, key sizes and parameters - Study on cryptographic protocols - Privacy enhancing technologies review 20

Data Breach Notification related activities Supporting the EC and MS in defining technical implementation measures for Article 4 of the eprivacy Directive For security measures and incident reporting Collaborating with Art.29 WP In producing a severity methodology for assessment of breaches by DPAs Supporting the Commission In the Commission led expert group of Art 4 competent authorities Expert group composition: 60 % DPAs and 40 % NRAs ENISA has published a joint technical guideline on security measures for both Article 13a and Article 4 as there are important similarities in protecting networks and services on the one hand and personal data on the other hand 21

Privacy and data Protection The ENISA Perspective Assist the technical implementation of legal obligations (Policy implementation) - E.g. data minimization by example - Privacy by design, privacy by default, data portability and data erasure techniques Support everyday activities of DPAs and data controllers (Hands on) - E.g. minimum security measures, sectorial PIA schemes self-audit privacy frameworks, certification schemes Supporting co-operation and communication (Hands on) - Industry, research, standardization bodies, EC, EDPS, DPAs, Art29, etc. Analyze privacy needs in new technologies (Recommendations) - e.g. Cloud computing, Internet of things, smart cities, big data WP29 ENISA DPAs Industry / Standards EC EDPS 22

Summary 01 ENISA results rely on the collaboration with all NIS stakeholders 02 ENISA works in close collaboration with MS and the EU Institutions 03 Lessons leant in one sector can be transferred to others with the help of ENISA 04 ENISA promotes approaches to NIS that support economic growth 23

Thank you PO Box 1309, 710 01 Heraklion, Greece Tel: +30 28 14 40 9710 info@enisa.europa.eu www.enisa.europa.eu