www.computerweekly.com Open in urlscan Pro
2606:4700::6812:1586  Public Scan

Submitted URL: https://go.techtarget.com/r/213685266/44220482/17?utm_content=eru-rd2-rcpC
Effective URL: https://www.computerweekly.com/news/252515140/European-Commission-proposes-new-cyber-security-regulations?utm_campaign=20220331...
Submission: On March 31 via api from SE — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.computerweekly.com/search/query

<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

Text Content

3
Trending Now

Market eval: Secure web gatewaysDownload NowView All3
X
3Hello, these 3 documents have been trending and as a member they are free to
you.
 * 
   Market eval: Secure web gatewaysDownload Now
 * 
   Hybrid work: How to achieve reliable connectivityDownload Now
 * 
   How data layer technologies poise position financial institutions for
   successDownload Now




Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * Webinars
 * Sign up for our daily newsletter

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
    * IT in France
    * IT in the Nordics
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Quality/governance
    * Data warehousing
    * Database management
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
    * IT in India
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * Cloud storage
    * Containers and storage
    * Compliance and storage
    * Backup
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 


News


EUROPEAN COMMISSION PROPOSES NEW CYBER SECURITY REGULATIONS




NEW CYBER AND INFORMATION SECURITY REGULATIONS HAVE BEEN PROPOSED BY THE
EUROPEAN COMMISSION TO CREATE A MINIMUM SET OF STANDARDS IN BOTH AREAS

Share this item with your network:

 * 
 * 
 * 


By
 * Sebastian Klovig Skelton , Senior reporter

Published: 25 Mar 2022 17:29

The European Commission (EC) has proposed two new regulations to establish
common cyber and information security measures across the bloc, with the aim of
bolstering resilience and response capacity against a range of cyber threats.



Under the proposed cybersecurity regulation, which was published 22 March 2022,
all European Union (EU) institutions, bodies, offices, and agencies will be
required to have cyber security frameworks in place for governance, risk
management, and control.

They will also be required to conduct regular maturity assessments, implement
plans for improvement, and share any incident-related information with Computer
Emergency Response Team (CERT-EU) “without undue delay.”

The regulation would also establish a new inter-institutional Cybersecurity
Board to drive and monitor the implementation of the regulation. The new board
will further help to steer CERT-EU, which will also have its mandate extended to
fill the triple role of being an incident response coordination hub, a central
advisory body, and a service provider.

Under a separate Information Security Regulation proposal published the same
day, the EC is seeking to create a minimum set of security rules to both enhance
and standardise how EU public organisations protect themselves against evolving
threats to their information.

These rules will also provide for the secure exchange of information across the
EU by establishing common practices and measures to protect information flows,
including a shared approach to information categorisation based on the level of
confidentiality.

“In a connected environment, a single cyber security incident can affect an
entire organisation. This is why it is critical to build a strong shield against
cyber threats and incidents that could disturb our capacity to act,” said
Johannes Hahn, the EU’s budget and administration commissioner, in a statement.

“The regulations we are proposing today are a milestone in the EU cyber security
and information security landscape. They are based on reinforced cooperation and
mutual support among EU institutions, bodies, offices and agencies and on a
coordinated preparedness and response. This is a real EU collective endeavour.”

The EC has further claimed the changes are needed in the context of the Covid-19
pandemic and growing geopolitical challenges, and that the rules will strengthen
inter-institutional cooperation, minimise risk exposure and generally bolster
the EU’s security culture.

The proposals – which must now be discussed by the European Parliament and
Council - are in line with the EU’s Security Union Strategy, which was published
in December 2020 and intended to bolster the bloc’s collective resilience
against cyber threats.

According to a World Economic Forum (WEF) report from January 2022, cyber
security threats rank among the top risks facing the world, as threats such as
ransomware and nation-state-backed attacks proliferate and organisations become
more reliant on technology.

“With cyber threats now growing faster than our ability to eradicate them
permanently, it is clear that neither resilience nor governance are possible
without credible and sophisticated cyber risk management plans,” said Carolina
Klint, risk management leader for continental Europe at insurance broker and
risk specialist Marsh.

On 9 March 2022, European governments also drafted a declaration to reinforce
the EU’s cyber security capacities, which included increasing EU funding to
support national efforts and develop a strong cyber security ecosystem.

The additional funding is supposed  to help EU countries scale up their cyber
capabilities by helping to create a market for trusted providers, as well as
reinforcing the resilience of select operators that would be at risk during a
conflict.

The declaration also urged European authorities to come up with a series of
recommendations on how to reinforce the resilience of Europe’s digital
infrastructure.

In the UK, the government is also seeking to make a series of updates to the
2018 Network and Information Systems (NIS) regulations, which were initially
designed to protect the security of providers of critical national
infrastructure (CNI) - in this case, utilities, transport, healthcare and
communications – backed by multimillion-pound fines for non-compliance.

These regulations will be expanded in their scope to include managed service
providers (MSPs) and providers of specialised online and digital services,
including managed security services, workplace services, and general IT
outsourcing. The UK government launched a consultation for feedback on 19
January 2021.

READ MORE ABOUT CYBER SECURITY RULES AND REGULATIONS

 * US president Joe Biden signed new cyber security incident reporting mandates
   into law on Tuesday 15 March, making it a legal requirement for operators of
   critical national infrastructure (CNI) to disclose cyber attacks to the
   government
 * Germany’s Federal Office for Information Security has made a formal
   recommendation that Kaspersky users in Germany replace the supplier’s
   antivirus protection software with alternative products, but will not enact
   an outright ban on the Russian firm
 * DCMS opens a consultation on new regulations, and a draft code of practice,
   that will supposedly help communications services providers fulfil the legal
   duties imposed on them under the Telecommunications (Security) Act that
   became law in November 2021



READ MORE ON HACKERS AND CYBERCRIME PREVENTION

 * FINNISH GOVERNMENT STRENGTHENS COUNTRY’S IT NETWORK SECURITY
   
   

 * WHICH? ONLINE BANKING INVESTIGATION REVEALS ‘WORRYING GAPS’ IN SECURITY
   
   
   By: Karl Flinders

 * CALIFORNIA’S CCPA AN OPPORTUNITY FOR SECURITY INDUSTRY TO DO BETTER
   
   
   By: Alex Scroxton

 * GOVERNMENT SEEKS VIEWS ON POST-BREXIT SECURITY ALIGNMENT
   
   
   By: Alex Scroxton

Latest News
 * Lapsus$ cyber crime spree continues despite arrests
 * Spring4Shell zero-day sprung on security teams
 * How a woman CIO rose up the ranks in a Japanese firm
 * View All News

Download Computer Weekly
 * In The Current Issue:
   * Raspberry Pi at 10: Cheaper than chips
   * Gartner: How to retain and motivate IT staff
   * How Dutch hackers are working to make the internet safe
   Download Current Issue

Latest Blog Posts
 * You’ve just crossed over into the Dyson Zone – Downtime
 * The low-no-code series – Contentstack: Making a conscious compromise – CW
   Developer Network
 * View All Blogs

Related Content
 * Government seeks views on post-Brexit security ... – ComputerWeekly.com
 * Which? online banking investigation reveals ‘worrying... – ComputerWeekly.com
 * Cyber security high on European Commission agenda – ComputerWeekly.com



Latest TechTarget resources
 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management

SearchCIO
 * Lack of competition is driving federal budget antitrust hike
   
   In Biden's proposed budget, the FTC would gain an additional $139 million
   while the DOJ's antitrust division would see an $88 ...

 * CHIPS Act moves the needle on US chip manufacturing
   
   Not only does the CHIPS Act funnel billions into U.S. semiconductor chip
   manufacturing, it reflects a major change in how U.S. ...

 * Top 9 blockchain platforms to consider in 2022
   
   Get the lowdown on the major features, differentiators, strengths and
   weaknesses of the blockchain platforms getting the most ...

SearchSecurity
 * Viasat confirms cyber attack on Ukraine customers
   
   The U.S.-based satellite internet provider said a 'multifaceted and
   deliberate cyber attack' struck Viasat's KA-SAT network on ...

 * Axie Infinity hack results in $600M cryptocurrency heist
   
   Axie Infinity, whose developer was hacked this month, is a popular NFT-based
   video game in which players earn cryptocurrency by ...

 * Rapid7 finds zero-day attacks surged in 2021
   
   Cybercriminals are turning bugs into exploits faster than ever, according to
   Rapid7, which found that the average time to known ...

SearchNetworking
 * Aruba urges customers to adopt network as a service
   
   Aruba wants more customers to switch to network as a service, but companies
   benefiting from a standard product license are ...

 * Best practices for enterprise CBRS deployment
   
   Enterprises can use CBRS spectrum to deploy private cellular networks that
   offer reliable and predictable coverage. Learn about ...

 * Aruba Central basics key for Atmosphere attendees
   
   IT pros like to check out cutting-edge technology, but they say Aruba Central
   basics like device onboarding and data privacy are ...

SearchDataCenter
 * The global state of data center sustainability
   
   Review green initiatives in the world of data centers: sustainable designs
   and practices, what other organizations are doing and ...

 * ServiceNow adds new RPA features to San Diego release
   
   Doubling down on its RPA initiative, ServiceNow unveiled the San Diego
   version of its Now Platform that contains an RPA Hub and a...

 * Nvidia beefs up its line of AI supercomputers, chips
   
   Nvidia rolls out a new GPU architecture, supercomputers and chips that in
   concert will aid developers in creating the hardware ...

SearchDataManagement
 * Oracle HeatWave ML fuses machine learning with database
   
   The tech giant is continuing to build out the capabilities of its MySQL
   HeatWave cloud database with real-time elasticity, ...

 * Pinecone raises $28M to advance vector database
   
   The startup's database technology enables enterprises to use traditional data
   stores alongside vector-based data to support ...

 * DataStax Astra DB integrates real-time data streaming
   
   The database-as-a-service vendor advanced the change data capture
   capabilities of its cloud database with technology from its ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Answers
 * E-Products
 * Events
 * In Depth
 * Guides

 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info


Close