The European Union Adopts A Cyber Security Strategy

The European Union Council has formally adopted the March  2021 conclusions on the EU's cyber security strategy which was presented to the Commission in 2020. It contains a framework for how to defend businesses, organisations and EU citizens from cyber attacks and to promote secure information systems. 
 
The connclusions set a key objective of achieving strategic autonomy while preserving an open economy. This includes reinforcing the ability to make autonomous choices in the area of cyber security, with the aim to strengthen the EU's digital leadership and strategic capacities.
 
 
"The conclusions note that cyber security is essential for building a resilient, green and digital Europe," said the council in a statement. The strategy specifiaclly calls for a number of importabt new measures:- 
 
  • Creating a joint cyber unit focused on the EU's cybersecurity crisis management framework;
  • Accelerating the uptake of key internet security standards;
  • Developing strong encryption while protecting fundamental rights and supporting law enforcement and judicial authorities;
  • Preventing and countering cyberattacks that might affect supply chains, critical infrastructure and essential services;
  • Establishing a cyber intelligence working group to strengthen the EU's Intelligence and Situation Center, which is responsible for sharing classified information with its member states;
  • Establishing EU external cyber capacity by strengthening cooperation with international organizations and partner countries to increase cyber resilience.
  • The strategy also outlines plans to make international cyberspace "open, free and secure," according to the council.
  • The plan endorses the following measures in an effort to forward the bloc’s cyber leadership:
  • “strong encryption and threat information sharing”
  • “security operation centers across the EU to monitor for attacks”
  • “a joint cyber unit focused on the EU's cybersecurity crisis      management framework”
  • “a security standard for 5G technology”
  • “key internet security standards”
  • “countering cyberattacks that might affect supply chains [and] critical infrastructure”
  • “a cyber intelligence working group to strengthen the EU's Intelligence and Situation Center”
  • “strengthening cooperation with international organizations and partner countries”
 
The Report also stresses the need to "raise more awareness on cyber issues at the political and strategic decision-making levels by providing decision-makers with relevant knowledge and information and the need to enhance the awareness of general public and promote cyber hygiene.” 
 
The conclusions include a strong commitment by the council to swiftly complete the implementation of the EU 5G toolbox measures and to continue efforts to guarantee the security of 5G networks and the development of future network generations.
 
Actions laid out in the conclusions include the creation of a network of security operation centres across the Union to improve both threat detection and anticipation and the possible establishment of a cyber intelligence working group to strengthen the EU Intelligence and Situation Centre (INTCEN). 
 
Another proposed measure is the definition of a joint cyber unit that "would provide clear focus to the EU's cybersecurity crisis management framework."
 
Accelerating the adoption of key Internet security standards is another action point listed in the conclusions. This step, which the council says will require "a joint effort," is described as being "instrumental to increase the overall level of security and openness of the global Internet while increasing the competitiveness of the EU industry." Other actions include addressing the need to support the development of strong encryption as a means of protecting fundamental rights and digital security, while simultaneously ensuring that law enforcement agencies and judicial authorities can exercise the offline and online powers that have been granted to them. 
 
In order to ensure the development, implementation and monitoring of the proposals presented in the cyber security strategy, the Council encourages the Commission and the High Representative to establish a detailed implementation plan. The Council will also monitor the progress in the implementation of the conclusions through an action plan which will be regularly reviewed and updated.
 
EU Council:      GovInfoSecurity:        EU Council:     The CyberWire:          Infosecurity Magazine:
 
You Might Also Read: 
 
The Impact Of Brexit On British Cyber Security:
 
 
« Employees Hired & Fired By Algorithm
Your Employee's Cyber Awareness Is Critical »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

Multitel

Multitel

Multitel is an independent research centre. We develop and integrate emerging technologies into the industrial fabric at the regional and international levels.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Arculus Cyber Security

Arculus Cyber Security

Arculus Cyber Security enables customers to securely realise the benefits of digital transformation through pragmatic solutions, guidance and services.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.