Information Security - page 11
With digital technology now penetrating into the core of our businesses, production processes and public institutions, it becomes increasingly important that the technology is secure and trustworthy and complies with legal and ethical standards. More security is necessary, especially since the technology is highly complex, changes quickly and its risks are at the expense of the user. That is why confidence in technological expertise, compliance with agreements, standards and laws, and the focus on your interest of the supplier or implementation partner, is good but not always sufficient.
It is time for a next step towards:
- Ensuring compliance of digital technology with laws and regulation (i.a. GDPR) and providing assurance that products/services/processes do what they are suppose to (and nothing more). We will aim for more standardisation and certification, both in the Netherlands via initiatives at he Centre for Crime Prevention and Safety and the Online Trust Coalition, and in Europe via the European Commission.
- Sharing information about cyber vulnerabilities and incidents between government and businesses, and among businesses. Some important steps have been taken towards a ‘National covered system’, but there is more to be done. Securely sharing information between NCSC, DTC and other certs, and with cybersecurity partnerships, has to improve soon. Information that can help businesses guard themselves against concrete forms of ill intentions and damage cannot only reside at the government. Additionally, business should have the possibility to share information about incidents and threats that they experience themselves with others, so that they can be better prepared.
- Besides secure products and services, and information about current threats and vulnerabilities, it is also vital to practice how to act during an incident, including a situation in which some employees are working from home and others from the office. Therefore, we will once again draw attention to our exercise scenario and update it where necessary.
The new digital world offers many opportunities. This also increases dependence and vulnerability. By working together and sharing information and knowledge, we are all getting better and safer and we are creating new opportunities for these threats. We are working on this, both within the CIO Platform Nederland, and with the government and other parties outside.
-
April 12, 2016
Our game in the spotlight!
Attention for the Elevator Game at Eyeopeners on BNR Radio.
-
March 18, 2016
Multifaceted security cooperation
Join the Manifesto?!
-
March 7, 2016
Coordinated Vulnerability Disclosure/Responsible Disclosure available!
Collaboration between hackers and researchers?!
-
April 22, 2015
Risks of Cybercrime
This morning our director Ronald Verbeek responded to BNR Nieuwsradio about the risks of Cybercrime.
- Previous page
- 1
- ...
- 8
- 9
- 10
- 11
- Next page
Information Security events
-
CEG Information Security | Online
CEG Information Security shares knowledge and experiences on topics like: cyber crime, privacy, creating awareness and what to do with dataleaks.
13 Feb -
CxO/CISO Theme session: 'So you thought you were already there with cybersecurity?' | Vitens Soestduinen Soest
Every year, the CIO Committee Information Security organises a valuable signature event for CIO/CDOs, CISOs and members of boards of directors/supervisory boards around the topic of cybersecurity.
25 Mar