The European Union's Digital Security Plan

Connected devices and sensors in infrastructure, in vehicles, in manufacturing plants are all generating data which have enormous value. This explosion of industrial data has led to a new wave of digital transformation with the potential to drive economic and social progress.

Europe is determined to make the 2020s its digital decade. The current tipping point of digital history indeed offers the EU a unique opportunity to reclaim digital sovereignty and become a leader in the next wave of digital transformation. 

The European Commission now launched two pieces of new legislation to achieve this goal, the Digital Services Act (DSA) and the Digital Markets Act (DMA) to drive innovation and fair competition online.

The DSA And DMA Have Twin Goals:

  • Create a safer digital space in which the fundamental rights of all users of digital services are protected
  • Establish a level playing field to foster innovation, growth, and competitiveness, both in the European Single Market and globally.

These regulations are generating a high level of attention, demonstrating that both the European Commission and national governments are taking bold steps to seize the industrial data opportunity.

The vision of the European leadership is to create a Single European Data Market where data will be able to flow freely within as well as across industries and countries. So the rules around data would follow similar principles to the free movement of citizens, goods and services across the EU. This is a powerful vision and an important building block of the European Digital Strategy. In this context, the EU has launched a Data Strategy so that Europe does not miss the new digital wave and gains ownership of the value of its industrial data.

In addition, Europe is blazing a trail on decentralised cloud: 25 Member States have signed a declaration to establish a European Alliance on Industrial Data and Cloud to enable cooperation on resilient and competitive cloud infrastructure and services across Europe. This could represent a €10 billion investment by the EU over the next seven years. 

Governments And Industry Cooperating To Strengthen European Cloud

The GAIA-X initiative aims to create Europe’s next generation of data infrastructure: a secure, federated and decentralised cloud system meeting the highest standards of digital sovereignty while promoting innovation, data sharing and data monetisation. GAIA-X will develop common requirements for a European data infrastructure with common rules for secure sharing of data.  “GAIA-X is a project initiated by Europe for Europe and beyond. Its aim is to develop common requirements for a European data infrastructure. Therefore openness, transparency and the ability to connect to other European countries are central to GAIA-X. Representatives from several European countries and further international partners are currently involved in the project. We want to invite other European and international partners to join the project and to contribute to its development ”. 

The European Union Cloud Strategy  Has 3 Key Priorities

  • Strengthening Global Cooperation – to increase global cooperation between public and private stakeholders to foster a collective response to cyber crime and address key security challenges posed by barriers to cooperation.
  • Understanding Future Networks and Technology – to identify cyber security challenges and opportunities coming from the new technologies, and accelerate forward-looking solutions.
  • Building Cyber Resilience – to develop and amplify scalable solutions to accelerate the adoption of best practices and increase cyber resilience.

The European Union believes that reshaping cloud computing is the necessary response to these developments and that its success depends on decentralised cloud architectures that allow organisations not only to control their data and how it is shared but also control its monetisation.

European Commission:      European Sting:         GAIA-X:       WEF

You Might  Also Read:

The Impact Of Brexit On British Cyber Security:

 

« Pipeline Hack: Biden Issues An Executive Order
The FBI Can Covertly Access Your Computer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

Data Security Council of India (DSCI)

Data Security Council of India (DSCI)

DSCI is a premier industry body on cyber security and data protection in India, committed to making the cyberspace safe, secure and trusted.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

Glocomms

Glocomms

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs in San Francisco, New York, London and Berlin.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.