Dutch Cyber Security Under Threat

Dutch defence and security organisations, including the national police and the NCTV, are jointly responsible for the country’s national security, including in the digital domain. In addition to the sea, land, air and space, cyberspace is the fifth working area of the armed forces. The Netherlands currently largely relies on American companies such as Microsoft, Amazon, Google and Oracle for its digital services and these service providers often do not fall under jurisidiction of common European Union  surveillance laws. 

Consequently, there is growing concern that the Dutch government can no longer enforce its own privacy legislation and the loss of national digital autonomy is highlighted in a report from the Dutch National Cybersecurity Council (CSR).

Virtually all vital processes and systems in the Netherlands are partly or fully digitalised. Today, almost everything is connected, making it increasingly difficult to maintain an overview and control. "Our digital autonomy is under pressure and that touches the heart of Dutch society; cyber threats are increasing and we are becoming increasingly dependent on the digital infrastructure that is in the hands of a number of large foreign market players," the CSR Report  says.

To counter this development, autonomy in the digital sphere must urgently become one of the government’s central policies. The Netherlands must invest in its own detection systems for computer hacks for vital services which banks, telecom operators and water companies would then be forced to use, says the CRS.

This can be done by supporting strategically valuable tech companies, the advisory body explained. More public-private partnerships and an active role of the Netherlands in the development of international standards are also needed, according to Digital Infrastructure Netherlands Foundation Michiel Steltman. "Almost all cyber security standards are currently American. Large international players have a head start and without our intervention, it will only get worse," said Steltman. 
 

CSR:        NL Times:          TNO:       Livestorm:        Dutch News

You Might Also Read:

The Cyber Security Top Ten Power List:

 

« Most Cyber Security Teams Are Understaffed
New Zealand Health Service Is Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

LinkUp

LinkUp

LinkUp is a leading data-driven job search company. Every day we index millions of job openings directly from employer websites.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

TeraByte

TeraByte

TeraByte is an information security company which helps to educate and protect businesses from cyber security related risks.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.