The European Union's Digital Security Plan

Connected devices and sensors in infrastructure, in vehicles, in manufacturing plants are all generating data which have enormous value. This explosion of industrial data has led to a new wave of digital transformation with the potential to drive economic and social progress.

Europe is determined to make the 2020s its digital decade. The current tipping point of digital history indeed offers the EU a unique opportunity to reclaim digital sovereignty and become a leader in the next wave of digital transformation. 

The European Commission now launched two pieces of new legislation to achieve this goal, the Digital Services Act (DSA) and the Digital Markets Act (DMA) to drive innovation and fair competition online.

The DSA And DMA Have Twin Goals:

  • Create a safer digital space in which the fundamental rights of all users of digital services are protected
  • Establish a level playing field to foster innovation, growth, and competitiveness, both in the European Single Market and globally.

These regulations are generating a high level of attention, demonstrating that both the European Commission and national governments are taking bold steps to seize the industrial data opportunity.

The vision of the European leadership is to create a Single European Data Market where data will be able to flow freely within as well as across industries and countries. So the rules around data would follow similar principles to the free movement of citizens, goods and services across the EU. This is a powerful vision and an important building block of the European Digital Strategy. In this context, the EU has launched a Data Strategy so that Europe does not miss the new digital wave and gains ownership of the value of its industrial data.

In addition, Europe is blazing a trail on decentralised cloud: 25 Member States have signed a declaration to establish a European Alliance on Industrial Data and Cloud to enable cooperation on resilient and competitive cloud infrastructure and services across Europe. This could represent a €10 billion investment by the EU over the next seven years. 

Governments And Industry Cooperating To Strengthen European Cloud

The GAIA-X initiative aims to create Europe’s next generation of data infrastructure: a secure, federated and decentralised cloud system meeting the highest standards of digital sovereignty while promoting innovation, data sharing and data monetisation. GAIA-X will develop common requirements for a European data infrastructure with common rules for secure sharing of data.  “GAIA-X is a project initiated by Europe for Europe and beyond. Its aim is to develop common requirements for a European data infrastructure. Therefore openness, transparency and the ability to connect to other European countries are central to GAIA-X. Representatives from several European countries and further international partners are currently involved in the project. We want to invite other European and international partners to join the project and to contribute to its development ”. 

The European Union Cloud Strategy  Has 3 Key Priorities

  • Strengthening Global Cooperation – to increase global cooperation between public and private stakeholders to foster a collective response to cyber crime and address key security challenges posed by barriers to cooperation.
  • Understanding Future Networks and Technology – to identify cyber security challenges and opportunities coming from the new technologies, and accelerate forward-looking solutions.
  • Building Cyber Resilience – to develop and amplify scalable solutions to accelerate the adoption of best practices and increase cyber resilience.

The European Union believes that reshaping cloud computing is the necessary response to these developments and that its success depends on decentralised cloud architectures that allow organisations not only to control their data and how it is shared but also control its monetisation.

European Commission:      European Sting:         GAIA-X:       WEF

You Might  Also Read:

The Impact Of Brexit On British Cyber Security:

 

« Pipeline Hack: Biden Issues An Executive Order
The FBI Can Covertly Access Your Computer »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.