EUParis CallCapacity BuildingStrategyCyberSecurityCybersecurity has become an increasingly important concern across the European Union and the globe as the internet has become more central and attacks on this iDutton, William H.Creese, SadieEsteve-Gonzalez, Patricia...
EU Agency for Cybersecurity, Executive Director, Juhan Lepassaar, declared: “The resilience of our EU critical infrastructures and technologies will highly depend on our ability to make strategic investments. I am confident that we have the competence and skills driving us to achieve our ...
concerning measures for a high common level of security of network and information systems across the Union (NIS Directive)Footnote30was presented in 2013 as a major element in the Cybersecurity Strategy, its underlying objective being to ensure a high level of security ...
In 2018, the US published the DoD Cyber Strategy, which initiated the “hunt forward” principle of cyber warfare, and extended its cyber defense line to other countries. In the mid of October, 2022, the US Cyber Command (CYBERCOM) published policy documents on cyber warfare. Based on the ...
The 2030 threats were presented to kick off the discussion on cyber crisis management in the EU, on the Directive on Network and Information Security Systems (NIS2) strategy and on certification. Foresight at ENISA With the work on foresight initiated with ENISA’s first report “Fores...
Cyber-security and the evolution of global ICT supply chains Chapter Two: The politics of cyber-security Chapter Three: Trade and the ICT sector Conclusions and implications for Huawei 2 3 10 26 51 62 1 © The Economist Intelligence Unit Limited 2014 Politi...
Certification is essential to enhance the trust and security of key digital good and services. Currently, certification schemes for ICT services and products exist within the EU, but without a coherent EU-wide framework, the risk of fragmentation and gro
The most successful CISOs will be those who can articulate the value of cybersecurity to the enterprise in the AI era, giving the business confidence to adopt AI securely. Related articles Is your greatest risk the complexity of your cyber strategy? Organizations face mounting cybersecurity ...
Furthermore, Article 23 of the NIS 2 Directive mandates the reporting of significant cyber incidents that disrupt supply chains to national authorities. This not only aids in mapping the cybersecurity threat landscape but also supports the development of a coordinated response strategy...
the objective of the US cyber operations was to “own the domain”; the US cyber forces put critical infrastructure as legitimate targets during times of cyber conflicts; and pursued preemptive strike as an offensive strategy. This showed the US militaristic ambition to seek hegemony in cyberspace...