Dutch Cyber Security Under Threat

Dutch defence and security organisations, including the national police and the NCTV, are jointly responsible for the country’s national security, including in the digital domain. In addition to the sea, land, air and space, cyberspace is the fifth working area of the armed forces. The Netherlands currently largely relies on American companies such as Microsoft, Amazon, Google and Oracle for its digital services and these service providers often do not fall under jurisidiction of common European Union  surveillance laws. 

Consequently, there is growing concern that the Dutch government can no longer enforce its own privacy legislation and the loss of national digital autonomy is highlighted in a report from the Dutch National Cybersecurity Council (CSR).

Virtually all vital processes and systems in the Netherlands are partly or fully digitalised. Today, almost everything is connected, making it increasingly difficult to maintain an overview and control. "Our digital autonomy is under pressure and that touches the heart of Dutch society; cyber threats are increasing and we are becoming increasingly dependent on the digital infrastructure that is in the hands of a number of large foreign market players," the CSR Report  says.

To counter this development, autonomy in the digital sphere must urgently become one of the government’s central policies. The Netherlands must invest in its own detection systems for computer hacks for vital services which banks, telecom operators and water companies would then be forced to use, says the CRS.

This can be done by supporting strategically valuable tech companies, the advisory body explained. More public-private partnerships and an active role of the Netherlands in the development of international standards are also needed, according to Digital Infrastructure Netherlands Foundation Michiel Steltman. "Almost all cyber security standards are currently American. Large international players have a head start and without our intervention, it will only get worse," said Steltman. 
 

CSR:        NL Times:          TNO:       Livestorm:        Dutch News

You Might Also Read:

The Cyber Security Top Ten Power List:

 

« Most Cyber Security Teams Are Understaffed
New Zealand Health Service Under Attack »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.