Information Security - page 7

Information Security

Our members decide on which themes we are active. We are working on a safe, reliable digital business and society.

With digital technology now penetrating into the core of our businesses, production processes and public institutions, it becomes increasingly important that the technology is secure and trustworthy and complies with legal and ethical standards. More security is necessary, especially since the technology is highly complex, changes quickly and its risks are at the expense of the user. That is why confidence in technological expertise, compliance with agreements, standards and laws, and the focus on your interest of the supplier or implementation partner, is good but not always sufficient.

It is time for a next step towards:

  1. Ensuring compliance of digital technology with laws and regulation (i.a. GDPR) and providing assurance that products/services/processes do what they are suppose to (and nothing more). We will aim for more standardisation and certification, both in the Netherlands via initiatives at he Centre for Crime Prevention and Safety and the Online Trust Coalition, and in Europe via the European Commission.
  2. Sharing information about cyber vulnerabilities and incidents between government and businesses, and among businesses. Some important steps have been taken towards a ‘National covered system’, but there is more to be done. Securely sharing information between NCSC, DTC and other certs, and with cybersecurity partnerships, has to improve soon. Information that can help businesses guard themselves against concrete forms of ill intentions and damage cannot only reside at the government. Additionally, business should have the possibility to share information about incidents and threats that they experience themselves with others, so that they can be better prepared.
  3. Besides secure products and services, and information about current threats and vulnerabilities, it is also vital to practice how to act during an incident, including a situation in which some employees are working from home and others from the office. Therefore, we will once again draw attention to our exercise scenario and update it where necessary.  

The new digital world offers many opportunities. This also increases dependence and vulnerability. By working together and sharing information and knowledge, we are all getting better and safer and we are creating new opportunities for these threats. We are working on this, both within the CIO Platform Nederland, and with the government and other parties outside.

  1. July 2, 2018

    IT Duties of Care - more topical than ever

    On Thursday June 28th the CIO Platform Nederland and VNO-NCW organised a session about the IT Duties of Care for the second time. In this year 2018, we can say that the most pressing examples were related to the AVG implementation.

    20180702 IT Zorgplichten.jpg
  2. June 7, 2018

    Launch Digital Trust Center

    Today, Friday June 8th, digitaltrustcenter.nl has gone live. This is an important step in making companies more resistant to cyber crime.

    20180607 lancering digital trust center.jpg
  3. June 7, 2018

    Development risk model and cyber security quality label

    The CIO Platform Nederland collaborates with the business and the government on a new risk model and a cyber security quality label, initiated by the Centre for Crime Prevention and Security (the CCV).

    20180606 Risicomodel en keurmerk Cybersecurity.jpg
  4. April 3, 2018

    GDPR compliant or in control?

    “A very interesting and interactive session in which Aleid Wolfsen, chairman of the Dutch data protection authority, answered directly all questions. Great!” This was one of the reactions of one of the more than 30 participants of the Theme session about the Implementation of the GDPR.

    2018-03-26 Nieuwsbericht GDPR.jpg

Information Security events

  1. Online CIO lunch session | Cybersecurity Insurance

    Through the online lunch sessions for and by CIOs, we discuss important issues initiated by our members  The sessions will consist of an introduction by one of the members and space for questions/discussion.

    For CxO only

    24 Oct
  2. CEG Information Security | NIS2 throughout the value chain | KVK | Utrecht Utrecht

    CEG Information Security shares knowledge and experiences on topics like: cyber crime, privacy, creating awareness and what to do with dataleaks.

    25 Nov

More events

Close