The European Union Adopts A Cyber Security Strategy

The European Union Council has formally adopted the March  2021 conclusions on the EU's cyber security strategy which was presented to the Commission in 2020. It contains a framework for how to defend businesses, organisations and EU citizens from cyber attacks and to promote secure information systems. 
 
The connclusions set a key objective of achieving strategic autonomy while preserving an open economy. This includes reinforcing the ability to make autonomous choices in the area of cyber security, with the aim to strengthen the EU's digital leadership and strategic capacities.
 
 
"The conclusions note that cyber security is essential for building a resilient, green and digital Europe," said the council in a statement. The strategy specifiaclly calls for a number of importabt new measures:- 
 
  • Creating a joint cyber unit focused on the EU's cybersecurity crisis management framework;
  • Accelerating the uptake of key internet security standards;
  • Developing strong encryption while protecting fundamental rights and supporting law enforcement and judicial authorities;
  • Preventing and countering cyberattacks that might affect supply chains, critical infrastructure and essential services;
  • Establishing a cyber intelligence working group to strengthen the EU's Intelligence and Situation Center, which is responsible for sharing classified information with its member states;
  • Establishing EU external cyber capacity by strengthening cooperation with international organizations and partner countries to increase cyber resilience.
  • The strategy also outlines plans to make international cyberspace "open, free and secure," according to the council.
  • The plan endorses the following measures in an effort to forward the bloc’s cyber leadership:
  • “strong encryption and threat information sharing”
  • “security operation centers across the EU to monitor for attacks”
  • “a joint cyber unit focused on the EU's cybersecurity crisis      management framework”
  • “a security standard for 5G technology”
  • “key internet security standards”
  • “countering cyberattacks that might affect supply chains [and] critical infrastructure”
  • “a cyber intelligence working group to strengthen the EU's Intelligence and Situation Center”
  • “strengthening cooperation with international organizations and partner countries”
 
The Report also stresses the need to "raise more awareness on cyber issues at the political and strategic decision-making levels by providing decision-makers with relevant knowledge and information and the need to enhance the awareness of general public and promote cyber hygiene.” 
 
The conclusions include a strong commitment by the council to swiftly complete the implementation of the EU 5G toolbox measures and to continue efforts to guarantee the security of 5G networks and the development of future network generations.
 
Actions laid out in the conclusions include the creation of a network of security operation centres across the Union to improve both threat detection and anticipation and the possible establishment of a cyber intelligence working group to strengthen the EU Intelligence and Situation Centre (INTCEN). 
 
Another proposed measure is the definition of a joint cyber unit that "would provide clear focus to the EU's cybersecurity crisis management framework."
 
Accelerating the adoption of key Internet security standards is another action point listed in the conclusions. This step, which the council says will require "a joint effort," is described as being "instrumental to increase the overall level of security and openness of the global Internet while increasing the competitiveness of the EU industry." Other actions include addressing the need to support the development of strong encryption as a means of protecting fundamental rights and digital security, while simultaneously ensuring that law enforcement agencies and judicial authorities can exercise the offline and online powers that have been granted to them. 
 
In order to ensure the development, implementation and monitoring of the proposals presented in the cyber security strategy, the Council encourages the Commission and the High Representative to establish a detailed implementation plan. The Council will also monitor the progress in the implementation of the conclusions through an action plan which will be regularly reviewed and updated.
 
EU Council:      GovInfoSecurity:        EU Council:     The CyberWire:          Infosecurity Magazine:
 
You Might Also Read: 
 
The Impact Of Brexit On British Cyber Security:
 
 
« Employees Hired & Fired By Algorithm
Your Employee's Cyber Awareness Is Critical »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.