Dutch Cyber Security Under Threat

Dutch defence and security organisations, including the national police and the NCTV, are jointly responsible for the country’s national security, including in the digital domain. In addition to the sea, land, air and space, cyberspace is the fifth working area of the armed forces. The Netherlands currently largely relies on American companies such as Microsoft, Amazon, Google and Oracle for its digital services and these service providers often do not fall under jurisidiction of common European Union  surveillance laws. 

Consequently, there is growing concern that the Dutch government can no longer enforce its own privacy legislation and the loss of national digital autonomy is highlighted in a report from the Dutch National Cybersecurity Council (CSR).

Virtually all vital processes and systems in the Netherlands are partly or fully digitalised. Today, almost everything is connected, making it increasingly difficult to maintain an overview and control. "Our digital autonomy is under pressure and that touches the heart of Dutch society; cyber threats are increasing and we are becoming increasingly dependent on the digital infrastructure that is in the hands of a number of large foreign market players," the CSR Report  says.

To counter this development, autonomy in the digital sphere must urgently become one of the government’s central policies. The Netherlands must invest in its own detection systems for computer hacks for vital services which banks, telecom operators and water companies would then be forced to use, says the CRS.

This can be done by supporting strategically valuable tech companies, the advisory body explained. More public-private partnerships and an active role of the Netherlands in the development of international standards are also needed, according to Digital Infrastructure Netherlands Foundation Michiel Steltman. "Almost all cyber security standards are currently American. Large international players have a head start and without our intervention, it will only get worse," said Steltman. 
 

CSR:        NL Times:          TNO:       Livestorm:        Dutch News

You Might Also Read:

The Cyber Security Top Ten Power List:

 

« Most Cyber Security Teams Are Understaffed
New Zealand Health Service Is Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Interpol

Interpol

Interpol is the world’s largest international police organization. It is committed to the global fight against cybercrime, as well as tackling cyber-enabled crimes.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.