The EU Wants To Organise The New Tech Economy

Günther Oettinger is the European Commissioner for Digital Economy and Society since 1 November 2014

The Fourth Industrial Revolution aims to leverage differences between the physical, digital, and biological sphere. It integrates cyber-physical systems and the Internet of Things, big data and cloud computing, robotics, artificial-intelligence based systems and additive manufacturing. Compared to previous industrial revolutions, the fourth one is evolving at an exponential rather than at a linear pace.

The term "Fourth Industrial Revolution" refers to technologies and concepts of value chain organization. The European Commission, under the responsibility of the Commissioner for Digital Economy and Society, Guenther Oettinger, is developing a strategy and an action plan to support the digitalisation of European industry.

This development can potentially raise globe income levels and improve the quality of life for populations around the world. It produces several effects:

On the business side: it drastically modifies customer expectations, product enhancement, collaborative innovation and organisational forms. New technologies make assets more durable and resilient, while data and analytics change the way they are maintained.
    
On governments: as new technologies increasingly enable citizens to engage with governments, while governments gain more and more tools to increase their control over population. Governments and legislators must collaborate closely with civil society to be able to properly answer to challenges.

On people: one of the greatest challenges is on privacy, on the notion of ownership, consumer-patterns and how we devote time to develop skills.

EU Commission:

« Europe’s Digital Watchdog Zeros In On US Tech
China & Indonesia Engage In Joint Cyber War Simulations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

SecuriThings

SecuriThings

SecuriThings is a User and Entity Behavioral Analytics (UEBA) solution for IoT security.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

CyberQP

CyberQP

CyberQP (formerly Quickpass Cybersecurity) provide Privileged Access Management built for MSPs. Our system is designed to reduce ransomware and social engineering attack risks.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.