EU recognizes the significance of Cyber Security Network Information Security Directive •
Put in place a minimum level of NIS in the Member States and thus increase the overall level of preparedness and response.
•
Improve cooperation on NIS at EU level with a view to counter cross border incidents and threats effectively. A secure information-sharing infrastructure will be put in place to allow for the exchange of sensitive and confidential information among the competent authorities.
•
Create a culture of risk management and improve the sharing of information between the private and public sectors.
General Data Protection Regulation •
Supersedes the Data Protection Directive (1995) to unify data protection within the European Union (EU) with a single law.
Network Information Security Directive Article 14 - Security requirements and incident notification 1. Member States shall ensure that public administrations and market operators take appropriate technical and organizational measures to manage the risks posed to the security of the networks and information systems which they control and use in their operations. Having regard to the state of the art, these measures shall guarantee a level of security appropriate to the risk presented. In particular, measures shall be taken to prevent and minimize the impact of incidents affecting their network and information system on the core services they provide and thus ensure the continuity of the services underpinned by those networks and information systems. 2. Member States shall ensure that public administrations and market operators notify to the competent authority incidents having a significant impact on the security of the core services they provide.
Network Information Security Directive General Remarks
•
Very specific on cooperation, coordination and response • •
•
Create framework and infrastructure that fosters cooperation and coordination within and between member states. Enforce incident notification and response.
Technologies & methods to implement protection measures are not described in detail. • •
Allows state-of-the-art innovative technologies to be implemented. Regular audits are mandatory.
Security Industry Security Industry Cyber Threat Alliance - Cryptowall 3.0 collaborative research 4046 unique samples 49 campaign code identifiers 406,887 attempted infections seen 839 CnC servers (typically compromised Word press sites) Proxy to 2nd ary Servers (5 IPs in Russia under 1 ISP) $300 - $1500 bit coins Transactions hop up to 80 wallets $325mil+ held in master wallet www.cyberthreatalliance.org