The European Union's Digital Security Plan

Connected devices and sensors in infrastructure, in vehicles, in manufacturing plants are all generating data which have enormous value. This explosion of industrial data has led to a new wave of digital transformation with the potential to drive economic and social progress.

Europe is determined to make the 2020s its digital decade. The current tipping point of digital history indeed offers the EU a unique opportunity to reclaim digital sovereignty and become a leader in the next wave of digital transformation. 

The European Commission now launched two pieces of new legislation to achieve this goal, the Digital Services Act (DSA) and the Digital Markets Act (DMA) to drive innovation and fair competition online.

The DSA And DMA Have Twin Goals:

  • Create a safer digital space in which the fundamental rights of all users of digital services are protected
  • Establish a level playing field to foster innovation, growth, and competitiveness, both in the European Single Market and globally.

These regulations are generating a high level of attention, demonstrating that both the European Commission and national governments are taking bold steps to seize the industrial data opportunity.

The vision of the European leadership is to create a Single European Data Market where data will be able to flow freely within as well as across industries and countries. So the rules around data would follow similar principles to the free movement of citizens, goods and services across the EU. This is a powerful vision and an important building block of the European Digital Strategy. In this context, the EU has launched a Data Strategy so that Europe does not miss the new digital wave and gains ownership of the value of its industrial data.

In addition, Europe is blazing a trail on decentralised cloud: 25 Member States have signed a declaration to establish a European Alliance on Industrial Data and Cloud to enable cooperation on resilient and competitive cloud infrastructure and services across Europe. This could represent a €10 billion investment by the EU over the next seven years. 

Governments And Industry Cooperating To Strengthen European Cloud

The GAIA-X initiative aims to create Europe’s next generation of data infrastructure: a secure, federated and decentralised cloud system meeting the highest standards of digital sovereignty while promoting innovation, data sharing and data monetisation. GAIA-X will develop common requirements for a European data infrastructure with common rules for secure sharing of data.  “GAIA-X is a project initiated by Europe for Europe and beyond. Its aim is to develop common requirements for a European data infrastructure. Therefore openness, transparency and the ability to connect to other European countries are central to GAIA-X. Representatives from several European countries and further international partners are currently involved in the project. We want to invite other European and international partners to join the project and to contribute to its development ”. 

The European Union Cloud Strategy  Has 3 Key Priorities

  • Strengthening Global Cooperation – to increase global cooperation between public and private stakeholders to foster a collective response to cyber crime and address key security challenges posed by barriers to cooperation.
  • Understanding Future Networks and Technology – to identify cyber security challenges and opportunities coming from the new technologies, and accelerate forward-looking solutions.
  • Building Cyber Resilience – to develop and amplify scalable solutions to accelerate the adoption of best practices and increase cyber resilience.

The European Union believes that reshaping cloud computing is the necessary response to these developments and that its success depends on decentralised cloud architectures that allow organisations not only to control their data and how it is shared but also control its monetisation.

European Commission:      European Sting:         GAIA-X:       WEF

You Might  Also Read:

The Impact Of Brexit On British Cyber Security:

 

« Pipeline Hack: Biden Issues An Executive Order
The FBI Can Covertly Access Your Computer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Iranian Cyber Police

Iranian Cyber Police

Cyber police of Islamic Republic of Iran was established in 2011 based on internal and international standards in order to prevent, investigate and combat cybercrime.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.