The European Union's Digital Security Plan

Connected devices and sensors in infrastructure, in vehicles, in manufacturing plants are all generating data which have enormous value. This explosion of industrial data has led to a new wave of digital transformation with the potential to drive economic and social progress.

Europe is determined to make the 2020s its digital decade. The current tipping point of digital history indeed offers the EU a unique opportunity to reclaim digital sovereignty and become a leader in the next wave of digital transformation. 

The European Commission now launched two pieces of new legislation to achieve this goal, the Digital Services Act (DSA) and the Digital Markets Act (DMA) to drive innovation and fair competition online.

The DSA And DMA Have Twin Goals:

  • Create a safer digital space in which the fundamental rights of all users of digital services are protected
  • Establish a level playing field to foster innovation, growth, and competitiveness, both in the European Single Market and globally.

These regulations are generating a high level of attention, demonstrating that both the European Commission and national governments are taking bold steps to seize the industrial data opportunity.

The vision of the European leadership is to create a Single European Data Market where data will be able to flow freely within as well as across industries and countries. So the rules around data would follow similar principles to the free movement of citizens, goods and services across the EU. This is a powerful vision and an important building block of the European Digital Strategy. In this context, the EU has launched a Data Strategy so that Europe does not miss the new digital wave and gains ownership of the value of its industrial data.

In addition, Europe is blazing a trail on decentralised cloud: 25 Member States have signed a declaration to establish a European Alliance on Industrial Data and Cloud to enable cooperation on resilient and competitive cloud infrastructure and services across Europe. This could represent a €10 billion investment by the EU over the next seven years. 

Governments And Industry Cooperating To Strengthen European Cloud

The GAIA-X initiative aims to create Europe’s next generation of data infrastructure: a secure, federated and decentralised cloud system meeting the highest standards of digital sovereignty while promoting innovation, data sharing and data monetisation. GAIA-X will develop common requirements for a European data infrastructure with common rules for secure sharing of data.  “GAIA-X is a project initiated by Europe for Europe and beyond. Its aim is to develop common requirements for a European data infrastructure. Therefore openness, transparency and the ability to connect to other European countries are central to GAIA-X. Representatives from several European countries and further international partners are currently involved in the project. We want to invite other European and international partners to join the project and to contribute to its development ”. 

The European Union Cloud Strategy  Has 3 Key Priorities

  • Strengthening Global Cooperation – to increase global cooperation between public and private stakeholders to foster a collective response to cyber crime and address key security challenges posed by barriers to cooperation.
  • Understanding Future Networks and Technology – to identify cyber security challenges and opportunities coming from the new technologies, and accelerate forward-looking solutions.
  • Building Cyber Resilience – to develop and amplify scalable solutions to accelerate the adoption of best practices and increase cyber resilience.

The European Union believes that reshaping cloud computing is the necessary response to these developments and that its success depends on decentralised cloud architectures that allow organisations not only to control their data and how it is shared but also control its monetisation.

European Commission:      European Sting:         GAIA-X:       WEF

You Might  Also Read:

The Impact Of Brexit On British Cyber Security:

 

« Pipeline Hack: Biden Issues An Executive Order
The FBI Can Covertly Access Your Computer »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.

Command Zero

Command Zero

Command Zero is the industry’s first autonomous and AI-assisted cyber investigations platform, built to transform security operations in complex enterprise environments.