Dutch Cyber Security Under Threat

Dutch defence and security organisations, including the national police and the NCTV, are jointly responsible for the country’s national security, including in the digital domain. In addition to the sea, land, air and space, cyberspace is the fifth working area of the armed forces. The Netherlands currently largely relies on American companies such as Microsoft, Amazon, Google and Oracle for its digital services and these service providers often do not fall under jurisidiction of common European Union  surveillance laws. 

Consequently, there is growing concern that the Dutch government can no longer enforce its own privacy legislation and the loss of national digital autonomy is highlighted in a report from the Dutch National Cybersecurity Council (CSR).

Virtually all vital processes and systems in the Netherlands are partly or fully digitalised. Today, almost everything is connected, making it increasingly difficult to maintain an overview and control. "Our digital autonomy is under pressure and that touches the heart of Dutch society; cyber threats are increasing and we are becoming increasingly dependent on the digital infrastructure that is in the hands of a number of large foreign market players," the CSR Report  says.

To counter this development, autonomy in the digital sphere must urgently become one of the government’s central policies. The Netherlands must invest in its own detection systems for computer hacks for vital services which banks, telecom operators and water companies would then be forced to use, says the CRS.

This can be done by supporting strategically valuable tech companies, the advisory body explained. More public-private partnerships and an active role of the Netherlands in the development of international standards are also needed, according to Digital Infrastructure Netherlands Foundation Michiel Steltman. "Almost all cyber security standards are currently American. Large international players have a head start and without our intervention, it will only get worse," said Steltman. 
 

CSR:        NL Times:          TNO:       Livestorm:        Dutch News

You Might Also Read:

The Cyber Security Top Ten Power List:

 

« Most Cyber Security Teams Are Understaffed
New Zealand Health Service Is Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

AEC

AEC

AEC is a provider of information security products and services including risk analysis, penetration testing and the implementation of security solutions.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Cyber Security Canada

Cyber Security Canada

Cyber Security Canada is an accredited Certification Body for government-backed Cyber Security Certification Programs, designed specifically for small and medium-sized Canadian businesses.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

Accelerynt

Accelerynt

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.