Information Security - page 5
With digital technology now penetrating into the core of our businesses, production processes and public institutions, it becomes increasingly important that the technology is secure and trustworthy and complies with legal and ethical standards. More security is necessary, especially since the technology is highly complex, changes quickly and its risks are at the expense of the user. That is why confidence in technological expertise, compliance with agreements, standards and laws, and the focus on your interest of the supplier or implementation partner, is good but not always sufficient.
It is time for a next step towards:
- Ensuring compliance of digital technology with laws and regulation (i.a. GDPR) and providing assurance that products/services/processes do what they are suppose to (and nothing more). We will aim for more standardisation and certification, both in the Netherlands via initiatives at he Centre for Crime Prevention and Safety and the Online Trust Coalition, and in Europe via the European Commission.
- Sharing information about cyber vulnerabilities and incidents between government and businesses, and among businesses. Some important steps have been taken towards a ‘National covered system’, but there is more to be done. Securely sharing information between NCSC, DTC and other certs, and with cybersecurity partnerships, has to improve soon. Information that can help businesses guard themselves against concrete forms of ill intentions and damage cannot only reside at the government. Additionally, business should have the possibility to share information about incidents and threats that they experience themselves with others, so that they can be better prepared.
- Besides secure products and services, and information about current threats and vulnerabilities, it is also vital to practice how to act during an incident, including a situation in which some employees are working from home and others from the office. Therefore, we will once again draw attention to our exercise scenario and update it where necessary.
The new digital world offers many opportunities. This also increases dependence and vulnerability. By working together and sharing information and knowledge, we are all getting better and safer and we are creating new opportunities for these threats. We are working on this, both within the CIO Platform Nederland, and with the government and other parties outside.
-
August 18, 2020
Digital resilience affected by NCSC withholding information
In response to the article in the Financieele Dagblad of last August 17th with the title "The government knew who was vulnerable, but still allowed companies to be hacked. The government throws away information about hacks from companies", CIO Platform Nederland is calling on the government today to never let this happen again. And to take up its role for the digital resilience of Dutch society.
-
July 10, 2020
Jointly analysing cyber security information without sharing
On July 7th, 2020, at a webinar organized for members of CIO Platform Nederland, TNO introdced an ongoing research project in the field of the exchange of cyber security information and Secure Multi-Party Computation (MPC). In this blog post, we'll make the information from the webinar more widely available, as MPC and cyber security can be an interesting and valuable combination for anyone who is working on cyber security (threat) information.
-
January 17, 2020
Cyber ??security must be high on the board agenda at every organization, supported by the government
Recent incidents involving ransomware at, among others, the University of Maastricht and Travelex and vulnerabilities in Citrix products that have affected government organizations, companies and hospitals, show once again that attention to safety should not be allowed to deminish and that sharing knowledge about current vulnerabilities and what to do about them, is necessary.
-
January 6, 2020
Bug Report: call to action!
Have you been there? All you really want to do, is to get your own actions and projects done before the end of the year. That's quite enough!
Information Security events
-
CEG Information Security | Online
CEG Information Security shares knowledge and experiences on topics like: cyber crime, privacy, creating awareness and what to do with dataleaks.
13 Feb -
CxO/CISO Theme session: 'So you thought you were already there with cybersecurity?' | Vitens Soestduinen Soest
Every year, the CIO Committee Information Security organises a valuable signature event for CIO/CDOs, CISOs and members of boards of directors/supervisory boards around the topic of cybersecurity.
25 Mar