CyberSecurity SEE

European Union Boosts Cybersecurity: Regulations & Third-Party Help

European Union Boosts Cybersecurity: Regulations & Third-Party Help

The European Union has taken significant steps to bolster cybersecurity measures with the introduction of the Network and Information Security (NIS) Directive and the Digital Operational Resilience Act (DORA). These regulatory frameworks are aimed at ensuring that businesses, regardless of size, implement stringent cybersecurity practices to safeguard sensitive data.

In light of these new regulations, industry experts have pointed out that the full potential of the measures may only be fully realized with the involvement of third-party cybersecurity specialists. The ever-growing cyber threat landscape poses a significant challenge to businesses as they rely increasingly on digital infrastructure for various operations, such as client connectivity, product customization, and enhancing customer experiences. Cybercrime projections indicate that it could cost the global economy $9.5 trillion in 2024, with an annual escalation of 15%, reaching $10.5 trillion by 2025.

Recent incidents, such as the data breach in the United Kingdom’s Ministry of Defence payroll system, serving as a reminder that even the most advanced cybersecurity systems are susceptible to compromise. This breach exposed the names and banking details of both current and former armed forces members.

The European Union responded to the pressing need for enhanced cybersecurity measures by implementing the NIS Directive and DORA. The NIS Directive focuses on establishing common high-level cybersecurity practices, reinforcing system security requirements, addressing vulnerabilities in the supply chain, streamlining reporting, and imposing stringent supervisory measures with potential sanctions for non-compliance. On the other hand, DORA targets the financial sector, mandating periodic digital operational resilience testing and the implementation of management systems to monitor and report significant ICT-based incidents to relevant authorities.

The involvement of third-party cybersecurity specialists, according to industry experts like Darren Humphries, Group CISO & CTO-Partner at Acora, is crucial in continuously assessing cybersecurity practices. Humphries emphasizes the shift towards a more scientific approach to risk management, stressing the importance of metrics and documentation in meeting regulatory guidelines. He criticizes the reliance on self-attestation, citing the Ministry of Defence breach as a case where self-service attestation from suppliers contributed to the security lapse. Third-party assessments are seen as a way to verify processes and minimize oversights in cybersecurity frameworks.

In conclusion, while the NIS and DORA regulations represent a significant advancement in enhancing cybersecurity practices in Europe, leveraging third-party assessments and expertise is crucial for businesses to effectively combat cyber threats. By incorporating external expertise, businesses can ensure robust protection of sensitive information, comply with regulatory standards, and mitigate cybersecurity risks in an increasingly digital environment. Ultimately, this approach can help businesses navigate the evolving cybersecurity landscape and safeguard their operations against potential incidents.

Source link

Exit mobile version