SlideShare une entreprise Scribd logo
1  sur  30
European Cyber and Data security, 
What is coming and how we can be prepared 
for it
Who Am I?
Who Am I? 
CEO of BH Consulting – Independent Information Security Firm 
 Founder & Head of IRISSCERT – Ireland’s first Computer 
Emergency Response Team 
 Special Advisor on Internet Security Europol's CyberCrime 
Centre (EC3) 
 Adjunct Lecturer at University College Dublin 
 Expert Advisor to European Network & Information Security 
Agency (ENISA) 
 Regularly comments on media stories – 
BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times
“considers cybercrime to be an 
ever-increasing threat to the EU in 
the form of large-scale data 
breaches, online fraud and child 
sexual exploitation, while profit-driven 
cybercrime is becoming an 
enabler for other types of criminal 
activity..” 
Europol Serious & Organised Threat 
Assessment 2013
“Total Global Impact of 
CyberCrime US$ 3 Trillion, making 
it more profitable than the global 
trade in marijuana, cocaine and 
heroin combined.” 
Europol Serious & Organised Threat 
Assessment 2013
“cybercrime as one of nine EU 
priorities in the fight against 
serious and organised crime 
between 2014 and 2017” 
The Justice and Home Affairs Council 
of 6-7 June 2013
Policy on Critical Information Infrastructure Protection (CIIP) 
– 2009 
Focusing on the protection of Europe from cyber disruptions 
by enhancing security and resilience. 
 Based on five pillars: 
 Preparedness and prevention 
 Detection and response 
 Mitigation and recovery 
 International cooperation 
 Criteria for European Critical Infrastructures in the field 
of ICT.
DIRECTIVE 2011/92/EU OF THE EUROPEAN PARLIAMENT 
AND OF THE COUNCIL 
of 13 December 2011 
on combating the sexual abuse and sexual exploitation of 
children and child pornography, and replacing Council 
Framework Decision 2004/68/JHA 
(to be transposed into national law in the Member States by 18th 
December 2013)
DIRECTIVE 2013/40/EU OF THE EUROPEAN PARLIAMENT 
AND OF THE COUNCIL 
of 12 August 2013 
on attacks against information systems and replacing 
Council Framework Decision 2005/222/JH 
(to be transposed into national law in the Member States by 4th 
September 2015)
 This Directive 
 Sets out minimum rules defining criminal offences. 
 Improves operational cooperation between Member 
States’ national law enforcement services 
 Improves operational cooperation between Member 
States and relevant EU agencies (Eurojust, Europol, 
ENISA). 
 Member States have to respond within eight hours to 
an urgent request related to a cyber-attack. 
 EU agencies will conduct threat assessments and 
strategic analyses of cybercrime 
 All such activities have also to comply with existing EU 
legislation on privacy and electronic communication 
and data protection
 The main crimes defined in the Directive are 
 illegal access to information systems, 
 illegal interference with systems or data, 
 illegal interception of data transmissions, 
 stricter criminal sanctions for botnets
EU Cyber Security Strategy - 2013 
 Key Priorities For the Strategy 
 Freedom and openness 
 The EU's laws, norms and core values apply as much 
in cyberspace as in the physical world 
 Developing cyber security capacity building 
 Fostering international cooperation in cyberspace
The Cyber Security Directive 
(formally known as the Network & Information Security 
Directive) (the Directive) 
 bring all member states to a minimum security standard 
 promote cooperation and ensure preparedness and 
transparency in important sectors 
 introduce mandatory breach notification for certain 
organisations 
 All member states to develop a National Security Strategy 
 Appointment of a single point of contact among national 
competent authorities (NCAs)
Changes to Data Protection Directive 
 View to being ratified in 2015 
 Fines of up to €100 million or 5% of Global Turnover for Data 
Breaches 
 Mandatory Breach Notification “without undue delay” 
 Right to Be Forgotten 
 Companies with more than 250 employees will need to have a 
Data Protection Officer 
 Privacy by Default baked into all business processes & 
services
Trend Micro's UK Study re Data Protection Directive 
 50% of UK IT decision makers were unaware of the 
impending legislation 
 25% percent adamant that compliance is not achievable
Objectives 
 To enhance the capability of the Commission, other EU bodies and the 
Member States to prevent, address and to respond to NIS problems 
 To provide assistance and deliver advice to the Commission and the MS on 
issues related to NIS falling within its competencies as set out in this 
Regulation 
 To develop a high level of expertise and use this expertise to stimulate broad 
cooperation between actors from the public and private sectors 
 To assist the Commission, where called upon, in the technical preparatory 
work for updating and developing Community legislation in the field of NIS.
 Computer Emergency Response Teams 
 Resilience of Networks and Services and Critical Information 
Infrastructure Protection 
 Identity, Privacy and Trust 
 Risk Management 
Areas of Research
National Cyber Security Strategies
Countries aligned for the deployment of the European Cyber 
Security Month
List of available courses and certification 
programmes
@BrianHonan 
Brian.honan@bhconsulting.ie

Contenu connexe

Tendances

GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 
Secure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance SectorSecure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance SectorEftychia Chalvatzi
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Eftychia Chalvatzi
 
Data Protection Institutions in EU
Data Protection Institutions in EUData Protection Institutions in EU
Data Protection Institutions in EUMartyn Ripley
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eumanelmedina
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowDavid Erdos
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Wardsegughana
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
NIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices GuideNIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices Guidechildlikeegg1000
 
NIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices GuideNIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices Guideunevendock6891
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...IJNSA Journal
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Fairfax
 

Tendances (20)

GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
Secure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance SectorSecure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance Sector
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...
 
Data Protection Institutions in EU
Data Protection Institutions in EUData Protection Institutions in EU
Data Protection Institutions in EU
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
Hannes astok digital_security_2012
Hannes astok digital_security_2012Hannes astok digital_security_2012
Hannes astok digital_security_2012
 
EU data protection issues in IoT
EU data protection issues in IoTEU data protection issues in IoT
EU data protection issues in IoT
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
NIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices GuideNIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices Guide
 
NIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices GuideNIST Updates Federal Supply Chain Risk Management Practices Guide
NIST Updates Federal Supply Chain Risk Management Practices Guide
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
 
EU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe HarborEU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe Harbor
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyer
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 

En vedette

Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the CloudBrian Honan
 
Le droit au service du secret des affaires
Le droit au service du secret des affairesLe droit au service du secret des affaires
Le droit au service du secret des affairesBenjamin Benifei
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatiqueNIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatiqueITrust - Cybersecurity as a Service
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EUArete-Zoe, LLC
 
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?Finanssivalvonta
 
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa? FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa? Finanssivalvonta
 
Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Tiina Sarisalmi
 
Hot Topics For 2010
Hot Topics For 2010Hot Topics For 2010
Hot Topics For 2010Brian Honan
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhBrian Honan
 
10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco Industry10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco IndustryANM Farukh
 
Regina drury firepole marketing presentation
Regina drury firepole marketing presentationRegina drury firepole marketing presentation
Regina drury firepole marketing presentationRegina Drury
 
Learning from History
Learning from HistoryLearning from History
Learning from HistoryBrian Honan
 
Power point tema 6 : la hidrosfera
Power point tema 6 : la hidrosferaPower point tema 6 : la hidrosfera
Power point tema 6 : la hidrosferacharacas
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponseBrian Honan
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenBrian Honan
 

En vedette (20)

Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the Cloud
 
directive secret des affaires (en anglais)
directive secret des affaires (en anglais)directive secret des affaires (en anglais)
directive secret des affaires (en anglais)
 
Le droit au service du secret des affaires
Le droit au service du secret des affairesLe droit au service du secret des affaires
Le droit au service du secret des affaires
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatiqueNIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
 
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa? FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
FinTech ja sääntely: Miten maksupalveludirektiivi muuttaa maailmaa?
 
Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009
 
Hot Topics For 2010
Hot Topics For 2010Hot Topics For 2010
Hot Topics For 2010
 
Christopher Warren
Christopher  WarrenChristopher  Warren
Christopher Warren
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp Bh
 
10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco Industry10 Forecasts Bangladesh Telco Industry
10 Forecasts Bangladesh Telco Industry
 
Regina drury firepole marketing presentation
Regina drury firepole marketing presentationRegina drury firepole marketing presentation
Regina drury firepole marketing presentation
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
Power point tema 6 : la hidrosfera
Power point tema 6 : la hidrosferaPower point tema 6 : la hidrosfera
Power point tema 6 : la hidrosfera
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident Response
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
 

Similaire à Presentation on EU Directives Impacting Cyber Security for Information Security Ireland

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityDavid Sweigert
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paperpteromys_volans
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPRPavol Balaj
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPRTripwire
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Meteringnuances
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
Proposal for a Regulation establishing the interoperability of EU informatio...
 Proposal for a Regulation establishing the interoperability of EU informatio... Proposal for a Regulation establishing the interoperability of EU informatio...
Proposal for a Regulation establishing the interoperability of EU informatio...Thierry Debels
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber DiplomacyPetar Radanliev
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951N0b10111
 

Similaire à Presentation on EU Directives Impacting Cyber Security for Information Security Ireland (20)

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Quick Guide to GDPR
Quick Guide to GDPRQuick Guide to GDPR
Quick Guide to GDPR
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countriesDay 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
30-31 BB Nov_Dec14 (3)
30-31 BB Nov_Dec14 (3)30-31 BB Nov_Dec14 (3)
30-31 BB Nov_Dec14 (3)
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Proposal for a Regulation establishing the interoperability of EU informatio...
 Proposal for a Regulation establishing the interoperability of EU informatio... Proposal for a Regulation establishing the interoperability of EU informatio...
Proposal for a Regulation establishing the interoperability of EU informatio...
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951
 

Plus de Brian Honan

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynoteBrian Honan
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?Brian Honan
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
The dark side of the internet
The dark side of the internetThe dark side of the internet
The dark side of the internetBrian Honan
 
Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honanBrian Honan
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gapBrian Honan
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloudBrian Honan
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log managementBrian Honan
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP SpeedBrian Honan
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsBrian Honan
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing YouBrian Honan
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From IrelandBrian Honan
 

Plus de Brian Honan (16)

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynote
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Brian honan
Brian honanBrian honan
Brian honan
 
The dark side of the internet
The dark side of the internetThe dark side of the internet
The dark side of the internet
 
Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honan
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gap
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloud
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP Speed
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing You
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From Ireland
 

Dernier

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Dernier (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Presentation on EU Directives Impacting Cyber Security for Information Security Ireland

  • 1. European Cyber and Data security, What is coming and how we can be prepared for it
  • 3. Who Am I? CEO of BH Consulting – Independent Information Security Firm  Founder & Head of IRISSCERT – Ireland’s first Computer Emergency Response Team  Special Advisor on Internet Security Europol's CyberCrime Centre (EC3)  Adjunct Lecturer at University College Dublin  Expert Advisor to European Network & Information Security Agency (ENISA)  Regularly comments on media stories – BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times
  • 4.
  • 5.
  • 6. “considers cybercrime to be an ever-increasing threat to the EU in the form of large-scale data breaches, online fraud and child sexual exploitation, while profit-driven cybercrime is becoming an enabler for other types of criminal activity..” Europol Serious & Organised Threat Assessment 2013
  • 7. “Total Global Impact of CyberCrime US$ 3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.” Europol Serious & Organised Threat Assessment 2013
  • 8. “cybercrime as one of nine EU priorities in the fight against serious and organised crime between 2014 and 2017” The Justice and Home Affairs Council of 6-7 June 2013
  • 9.
  • 10. Policy on Critical Information Infrastructure Protection (CIIP) – 2009 Focusing on the protection of Europe from cyber disruptions by enhancing security and resilience.  Based on five pillars:  Preparedness and prevention  Detection and response  Mitigation and recovery  International cooperation  Criteria for European Critical Infrastructures in the field of ICT.
  • 11. DIRECTIVE 2011/92/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornography, and replacing Council Framework Decision 2004/68/JHA (to be transposed into national law in the Member States by 18th December 2013)
  • 12. DIRECTIVE 2013/40/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JH (to be transposed into national law in the Member States by 4th September 2015)
  • 13.  This Directive  Sets out minimum rules defining criminal offences.  Improves operational cooperation between Member States’ national law enforcement services  Improves operational cooperation between Member States and relevant EU agencies (Eurojust, Europol, ENISA).  Member States have to respond within eight hours to an urgent request related to a cyber-attack.  EU agencies will conduct threat assessments and strategic analyses of cybercrime  All such activities have also to comply with existing EU legislation on privacy and electronic communication and data protection
  • 14.  The main crimes defined in the Directive are  illegal access to information systems,  illegal interference with systems or data,  illegal interception of data transmissions,  stricter criminal sanctions for botnets
  • 15. EU Cyber Security Strategy - 2013  Key Priorities For the Strategy  Freedom and openness  The EU's laws, norms and core values apply as much in cyberspace as in the physical world  Developing cyber security capacity building  Fostering international cooperation in cyberspace
  • 16. The Cyber Security Directive (formally known as the Network & Information Security Directive) (the Directive)  bring all member states to a minimum security standard  promote cooperation and ensure preparedness and transparency in important sectors  introduce mandatory breach notification for certain organisations  All member states to develop a National Security Strategy  Appointment of a single point of contact among national competent authorities (NCAs)
  • 17. Changes to Data Protection Directive  View to being ratified in 2015  Fines of up to €100 million or 5% of Global Turnover for Data Breaches  Mandatory Breach Notification “without undue delay”  Right to Be Forgotten  Companies with more than 250 employees will need to have a Data Protection Officer  Privacy by Default baked into all business processes & services
  • 18. Trend Micro's UK Study re Data Protection Directive  50% of UK IT decision makers were unaware of the impending legislation  25% percent adamant that compliance is not achievable
  • 19.
  • 20. Objectives  To enhance the capability of the Commission, other EU bodies and the Member States to prevent, address and to respond to NIS problems  To provide assistance and deliver advice to the Commission and the MS on issues related to NIS falling within its competencies as set out in this Regulation  To develop a high level of expertise and use this expertise to stimulate broad cooperation between actors from the public and private sectors  To assist the Commission, where called upon, in the technical preparatory work for updating and developing Community legislation in the field of NIS.
  • 21.  Computer Emergency Response Teams  Resilience of Networks and Services and Critical Information Infrastructure Protection  Identity, Privacy and Trust  Risk Management Areas of Research
  • 22.
  • 24.
  • 25. Countries aligned for the deployment of the European Cyber Security Month
  • 26. List of available courses and certification programmes
  • 27.
  • 28.
  • 29.