The European Union Adopts A Cyber Security Strategy

The European Union Council has formally adopted the March  2021 conclusions on the EU's cyber security strategy which was presented to the Commission in 2020. It contains a framework for how to defend businesses, organisations and EU citizens from cyber attacks and to promote secure information systems. 
 
The connclusions set a key objective of achieving strategic autonomy while preserving an open economy. This includes reinforcing the ability to make autonomous choices in the area of cyber security, with the aim to strengthen the EU's digital leadership and strategic capacities.
 
 
"The conclusions note that cyber security is essential for building a resilient, green and digital Europe," said the council in a statement. The strategy specifiaclly calls for a number of importabt new measures:- 
 
  • Creating a joint cyber unit focused on the EU's cybersecurity crisis management framework;
  • Accelerating the uptake of key internet security standards;
  • Developing strong encryption while protecting fundamental rights and supporting law enforcement and judicial authorities;
  • Preventing and countering cyberattacks that might affect supply chains, critical infrastructure and essential services;
  • Establishing a cyber intelligence working group to strengthen the EU's Intelligence and Situation Center, which is responsible for sharing classified information with its member states;
  • Establishing EU external cyber capacity by strengthening cooperation with international organizations and partner countries to increase cyber resilience.
  • The strategy also outlines plans to make international cyberspace "open, free and secure," according to the council.
  • The plan endorses the following measures in an effort to forward the bloc’s cyber leadership:
  • “strong encryption and threat information sharing”
  • “security operation centers across the EU to monitor for attacks”
  • “a joint cyber unit focused on the EU's cybersecurity crisis      management framework”
  • “a security standard for 5G technology”
  • “key internet security standards”
  • “countering cyberattacks that might affect supply chains [and] critical infrastructure”
  • “a cyber intelligence working group to strengthen the EU's Intelligence and Situation Center”
  • “strengthening cooperation with international organizations and partner countries”
 
The Report also stresses the need to "raise more awareness on cyber issues at the political and strategic decision-making levels by providing decision-makers with relevant knowledge and information and the need to enhance the awareness of general public and promote cyber hygiene.” 
 
The conclusions include a strong commitment by the council to swiftly complete the implementation of the EU 5G toolbox measures and to continue efforts to guarantee the security of 5G networks and the development of future network generations.
 
Actions laid out in the conclusions include the creation of a network of security operation centres across the Union to improve both threat detection and anticipation and the possible establishment of a cyber intelligence working group to strengthen the EU Intelligence and Situation Centre (INTCEN). 
 
Another proposed measure is the definition of a joint cyber unit that "would provide clear focus to the EU's cybersecurity crisis management framework."
 
Accelerating the adoption of key Internet security standards is another action point listed in the conclusions. This step, which the council says will require "a joint effort," is described as being "instrumental to increase the overall level of security and openness of the global Internet while increasing the competitiveness of the EU industry." Other actions include addressing the need to support the development of strong encryption as a means of protecting fundamental rights and digital security, while simultaneously ensuring that law enforcement agencies and judicial authorities can exercise the offline and online powers that have been granted to them. 
 
In order to ensure the development, implementation and monitoring of the proposals presented in the cyber security strategy, the Council encourages the Commission and the High Representative to establish a detailed implementation plan. The Council will also monitor the progress in the implementation of the conclusions through an action plan which will be regularly reviewed and updated.
 
EU Council:      GovInfoSecurity:        EU Council:     The CyberWire:          Infosecurity Magazine:
 
You Might Also Read: 
 
The Impact Of Brexit On British Cyber Security:
 
 
« Employees Hired & Fired By Algorithm
Your Employee's Cyber Awareness Is Critical »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: Enhance Your Cloud Security With EDR &NDR

WEBINAR: Enhance Your Cloud Security With EDR &NDR

Thursday, 19 May, 2022 - Join this webinar to learn how to apply endpoint and network detection and response (EDR/NDR) concepts to your cloud asset protection strategy.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

CanSecWest

CanSecWest

CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and soci

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

PizzlySoft

PizzlySoft

PizzlySoft is a global company that is seeking convergence of network and security / software and hardware. We put our value on creating the best security.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.