Dutch Cyber Security Under Threat

Dutch defence and security organisations, including the national police and the NCTV, are jointly responsible for the country’s national security, including in the digital domain. In addition to the sea, land, air and space, cyberspace is the fifth working area of the armed forces. The Netherlands currently largely relies on American companies such as Microsoft, Amazon, Google and Oracle for its digital services and these service providers often do not fall under jurisidiction of common European Union  surveillance laws. 

Consequently, there is growing concern that the Dutch government can no longer enforce its own privacy legislation and the loss of national digital autonomy is highlighted in a report from the Dutch National Cybersecurity Council (CSR).

Virtually all vital processes and systems in the Netherlands are partly or fully digitalised. Today, almost everything is connected, making it increasingly difficult to maintain an overview and control. "Our digital autonomy is under pressure and that touches the heart of Dutch society; cyber threats are increasing and we are becoming increasingly dependent on the digital infrastructure that is in the hands of a number of large foreign market players," the CSR Report  says.

To counter this development, autonomy in the digital sphere must urgently become one of the government’s central policies. The Netherlands must invest in its own detection systems for computer hacks for vital services which banks, telecom operators and water companies would then be forced to use, says the CRS.

This can be done by supporting strategically valuable tech companies, the advisory body explained. More public-private partnerships and an active role of the Netherlands in the development of international standards are also needed, according to Digital Infrastructure Netherlands Foundation Michiel Steltman. "Almost all cyber security standards are currently American. Large international players have a head start and without our intervention, it will only get worse," said Steltman. 
 

CSR:        NL Times:          TNO:       Livestorm:        Dutch News

You Might Also Read:

The Cyber Security Top Ten Power List:

 

« Most Cyber Security Teams Are Understaffed
New Zealand Health Service Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.

GrayHats

GrayHats

GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape.