33
European Union Agency for Network and Information Security Dealing with Technology Evolution: From Policy Development to Implementation Steve Purser| Head of Core Operations CebiT 2017

Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

European Union Agency for Network and Information Security

Dealing with Technology Evolution:From Policy Development to Implementation

Steve Purser| Head of Core OperationsCebiT 2017

Page 2: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

2

Agenda

1 About ENISA

2 Cybersecurity as an Economic Enabler

3 ENISA & Policy Development

4 Aligning Skill-Sets with Industry Needs

5 ENISA & Policy Implementation

6 Challenges & Opportunities

Page 3: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

About ENISA

Page 4: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

4

ENISA

• ENISA was formed in 2004. The original mandate was renewed and extended in 2013.

• The Agency is a Centre of Expertise that supports the Commission and the EU Member States in the area of information security.

• We facilitate the exchange of information between communities, with particular emphasis on the EU institutions, the public sector and the private sector.

Page 5: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

5

Positioning ENISA activities

Page 6: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

Cybersecurity as an Economic Enabler

Page 7: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

7

• Market studies that address the relationship between cybersecurity and the economy are rare.

• The situation with raw data in general is better, but such data may not be comparable and further analysis is often necessary to understand the big picture.

• The situation is complicated by the fact that many companies still do not like to provide data relating to security – although this is getting better.

• Undertaking market studies in this area could be an opportunity for ENISA.

Market Studies & Available Data

Page 8: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

8

• Supply push market in the EU.

• EU market dominated by SMEs – but what is an SME?

• Innovative companies get eaten by conglomerates.

• We have good ideas, but seem to have very limited success in turning them into commercial services and products.

• Funding schemes that work well elsewhere do not necessarily work well in the EU.

• We need new business models if we are to compete successfully in cybersecurity in global markets.

Some Key Observations

Page 9: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

9

• As a proportion of GDP, the EU spends less than the US on cybersecurity but more than other global regions.

• The EU cybersecurity market is growing at about 6% CAGR, whereas the global average is around 8% CAGR.

• Up to € 640 billion EU value at risk in this sector between 2014 and 2020.

• ITSEC professionals in the EU forecast to grow at 6% per annum.

• Large European companies are typically more concerned about cyber security related risks than rest of world.

• Cyber security revenue of companies domiciled in Europe could be increased by € 1 billion by aligning with cyber security market size

Things we know

Page 10: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

10

• The ENISA Industry Event draws together SMEs with an interest in cybersecurity – both suppliers and consumers.

• The idea of these events is to build an effective industry cybersecurity community by actively involving public and private cyber security partners in the EU.

• In 2016, we matched supply and demand for cybersecurity products and services in the ePayments and eHealth sectors.

• In 2017, the event was about funding mechanisms and methodologies for cyber-security SMEs.

The ENISA Industry Group

Page 11: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

11

Cybersecurity can either act as a barrier to economic development or as an enabler.

Our joint responsibility is to make sure that it acts as an enabler.

Page 12: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

ENISA & PolicyDevelopment

Page 13: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

13

• Much of the work is carried out as part of the standard work

program deliverables.

• Captured in objective 3 of the ENISA strategy:

SO3: To assist the MS and the EU institutions and bodies in developing and implementing the policies necessary to meet the legal and regulatory requirements of NIS

How it fits in

SMART HOSPITALS:

Hospital Executives should Establish effective enterprise governance for cyber security

Associated industries should involve third parties in testing activities

…….

Page 14: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

14

ENISA THREAT LANDSCAPE - TOP THREATS

ETL 2016| Louis

Page 15: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

15

Smart cars, smart hospitals and smart airports studies

• Understand threats and assets

• Highlight security good practices in specific sectors

• Provide recommendations to enhance cyber security

Demos

• Hands on Bluetooth lock demo

• Live hacking attack and countermeasures

Expert groups with renowned subject matter experts

• Engage with communities

• Smart Cars, Intelligent Public Transports and eHealth expert group

Securing Europe’s smart infrastructures

http://enisa.europa.eu/smartinfra

Page 16: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

16

1. Risk assessment and security measures for data controllers

2. Cryptographic algorithms and tools

Security of personal data Privacy enhancing technologies & tools

Online privacy and security

1. Data protection by design and by default

2. Transparency, control, new user rights

3. Consent mechanisms4. Personal data breach

notifications

1. Confidentiality of communication

2. Cookies and other similar techniques (tracking)

Electronic communications privacy

ENISA in privacy and data protection(GDPR, ePrivacy Regulation)

Page 17: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

17

• Over the years, ENISA has created a number of stakeholder networks encompassing many communities:

• Industry umbrella groups

• Sectorial representation

• Public sector contacts

• Specialised communities (e.g. standardization/certification)

• …..

By communicating regularly with these stakeholders, we aim to understand their needs and to align communities with common goals.

Influencing Through Stakeholders

Page 18: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

Aligning Skill-Sets with Industry Needs

Page 19: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

19

• The European Cyber Security Month – is the EU’s annual advocacy campaign that takes place in October, with the aim to influence the adoption of secure behavior online.

• Scope: Coordination and support of partners to jointly promote cyber security and provide up to date security information through education and sharing of good practices.

• Collateral:

- www.cybersecuritymonth.eu

- NIS Quiz / NIS Education Map

- Posters / Infographics

- Tip sheets / recommendations

- Videos

ENISA & Awareness Raising

Page 20: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

20

• The European Cyber Security Challenge (ECSC) aims to unites the young cyber talents from Europe to compete against each other by solving security related tasks.

• Each country is represented by a team of 10 contestants, the winners of the national round. The age group ECSC is targeting is 14-25 years old.

• ECSC 2016 was held in Düsseldorf, Germany on 7-9 November 2016 with 10 countries attending.

• Since ECSC 2015, ENISA is lending its experience and position to coordinate and govern the ECSC effort to reach its full maturity.

Inspiring Students : The EU Cyber Security Challenge

Page 21: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

21

• It is important to make a distinction between awareness

raising and training.

• Awareness raising does exactly that – it makes people

more aware of the risks and provides general guidelines

on how to react.

- Awareness training that does not improve participation in the

security process is ineffective.

• Training on the other hand shows people how to carry

out specific information security tasks.

• Training could be much more developed in the area of

cybersecurity.

Distinguishing Awareness & Training

Page 22: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

22

• There are many information security training courses for industry

and security professionals.

• However, these training courses tend to cover a small number of

specialized posts:

• Network security engineer

• Penetration testers

• Chief Information Security Officers (CISO).

• We need a framework, which allows industry to access security

training for people in a variety of different positions, ranging

from business executives to data entry personnel.

• In today’s world, everyone needs to know about security.

So what about industry?

Page 23: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

ENISA & Policy Implementation

Page 24: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

24

• There are many…..

Implementation Challenges

Page 25: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

25

• The EU has a number of instruments for implementing

cybersecurity policy:

- EU regulation

- Strategic approaches

- Agreements with industry and economic incentives

- Standardisation and certification

- Spreading good practice

- Awareness raising and training…

Using Possibilities Wisely

Page 26: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

26

Example of Regulation : Security & Data Breach Notification

• Supporting MS in implementing Article 13a of the Telecommunications Framework Directive

• Supported NRA’s in implementing the provisions under article 13a

• Developed and implemented the process for collecting annual national reports of security breaches

• Developed minimum security requirements and propose associated metrics and thresholds

• Supporting COM and MS in defining technical implementation measures for Article 4 of the ePrivacy Directive.

• Recommendations for the implementation of Article 4.

• Collaboration with Art.29 TS in producing a severity methodology for the assessment of breaches by DPAs

26

Page 27: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

2727

Incidents per root cause category (percentage)

12

6

14

5

12

5

19 20

68

69

47

76

61

66

0

10

20

30

40

50

60

70

80

2011 2012 2013 2014

Natural phenomena Human errors Malicious actions System failures

Page 28: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

28

Example of Industry Agreements

• ENISA has developed a joint position on a number of issues with the major players in the EU semiconductor industry:

• Standardisation & Certification

• Security processes & services

• Security requirements & implementation

• Economic dimension

28

Page 29: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

29

Example of Best Practices

Big Data Security

Good Practices and Recommendations on the Security of Big Data Systems

Cyber Security and Resilience of Intelligent Public Transport

Good practices and recommendations

Security and Resilience of Smart Home Environments

Good practices and recommendations

Page 30: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

Challenges & Opportunities

Page 31: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

31

• Work together with public and private sector to ensure

that cybersecurity becomes an economic enabler in the

EU.

• Ensure that policy development and implementation is

keeping pace with the development of rapidly evolving

technologies.

• Bring research communities and operational

communities together to ensure that good ideas become

commercial products and services.

• Develop skill sets through a sensible mix of awareness

and security training initiatives.

Challenges & Opportunities (1)

Page 32: Dealing with Technology Evolution: From Policy Development to …bdp-gmbh.com/content/3-veranstaltungen/20170320-cebit... · 2017. 4. 10. · CebiT 2017. 2 Agenda 1 About ENISA 2

32

• Develop new business models in cybersecurity that leverage the

research excellence of the EU and its reputation as a

trustworthy partner.

• Develop funding models that are appropriate for SMEs

specializing in cybersecurity and back these up with a

framework for supporting their development.

• Make more use of ENISA to support these activities:

- Market studies in the economics of cybersecurity.

- Information hub between public and private sector.

- Community building and support.

- Centre of Excellence

Challenges & Opportunities (2)