The European Union's Digital Security Plan

Connected devices and sensors in infrastructure, in vehicles, in manufacturing plants are all generating data which have enormous value. This explosion of industrial data has led to a new wave of digital transformation with the potential to drive economic and social progress.

Europe is determined to make the 2020s its digital decade. The current tipping point of digital history indeed offers the EU a unique opportunity to reclaim digital sovereignty and become a leader in the next wave of digital transformation. 

The European Commission now launched two pieces of new legislation to achieve this goal, the Digital Services Act (DSA) and the Digital Markets Act (DMA) to drive innovation and fair competition online.

The DSA And DMA Have Twin Goals:

  • Create a safer digital space in which the fundamental rights of all users of digital services are protected
  • Establish a level playing field to foster innovation, growth, and competitiveness, both in the European Single Market and globally.

These regulations are generating a high level of attention, demonstrating that both the European Commission and national governments are taking bold steps to seize the industrial data opportunity.

The vision of the European leadership is to create a Single European Data Market where data will be able to flow freely within as well as across industries and countries. So the rules around data would follow similar principles to the free movement of citizens, goods and services across the EU. This is a powerful vision and an important building block of the European Digital Strategy. In this context, the EU has launched a Data Strategy so that Europe does not miss the new digital wave and gains ownership of the value of its industrial data.

In addition, Europe is blazing a trail on decentralised cloud: 25 Member States have signed a declaration to establish a European Alliance on Industrial Data and Cloud to enable cooperation on resilient and competitive cloud infrastructure and services across Europe. This could represent a €10 billion investment by the EU over the next seven years. 

Governments And Industry Cooperating To Strengthen European Cloud

The GAIA-X initiative aims to create Europe’s next generation of data infrastructure: a secure, federated and decentralised cloud system meeting the highest standards of digital sovereignty while promoting innovation, data sharing and data monetisation. GAIA-X will develop common requirements for a European data infrastructure with common rules for secure sharing of data.  “GAIA-X is a project initiated by Europe for Europe and beyond. Its aim is to develop common requirements for a European data infrastructure. Therefore openness, transparency and the ability to connect to other European countries are central to GAIA-X. Representatives from several European countries and further international partners are currently involved in the project. We want to invite other European and international partners to join the project and to contribute to its development ”. 

The European Union Cloud Strategy  Has 3 Key Priorities

  • Strengthening Global Cooperation – to increase global cooperation between public and private stakeholders to foster a collective response to cyber crime and address key security challenges posed by barriers to cooperation.
  • Understanding Future Networks and Technology – to identify cyber security challenges and opportunities coming from the new technologies, and accelerate forward-looking solutions.
  • Building Cyber Resilience – to develop and amplify scalable solutions to accelerate the adoption of best practices and increase cyber resilience.

The European Union believes that reshaping cloud computing is the necessary response to these developments and that its success depends on decentralised cloud architectures that allow organisations not only to control their data and how it is shared but also control its monetisation.

European Commission:      European Sting:         GAIA-X:       WEF

You Might  Also Read:

The Impact Of Brexit On British Cyber Security:

 

« Pipeline Hack: Biden Issues An Executive Order
The FBI Can Covertly Access Your Computer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Flatt Security

Flatt Security

Flatt Security is a cyber security startup based in Japan providing security assessments and other cyber security services.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

RecoLabs

RecoLabs

Reco’s proprietary AI technology dynamically maps business interactions within your collaboration tools to identify sensitive assets shared and uncover incidents that are relevant to your business.

Nextgen Group

Nextgen Group

Nextgen Group is a pioneering technology services group with innovative and unique services across enterprise software, cloud, data management, and cybersecurity solutions.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.