The European Security and Defence Union Issue 33

Page 28

THE EUROPEAN – SECURITY AND DEFENCE UNION

We need more efficient cybersecurity capacity building worldwide

Cybersecurity should be considered a transversal issue in development and cooperation

by Carlos Bandin Bujan, Programme Manager, DG DEVCO, European Commission, Brussels

E

ver-evolving Information and Communications Technologies (ICT) have revolutionised the way we live and interact in our society. Over the past 20 years, ICT has evolved to become in many cases a determining element in a variety of policy areas. Cyberspace provides the underlying platform for development, distributing transformative digital technologies, with profound global implications and many human, economic as well as social benefits1.

Our vulnerability to intrusion and manipulation Nowadays, two thirds of internet users are said to live in the developing world, where access to the internet is growing almost four times faster than in developed countries. It is estimated that by 2020 the number of devices connected to the internet will reach 50 billion – all potentially vulnerable to intrusion and manipulation. Businesses, banks, utility services, critical national infrastructure, and government agencies – all rely on IT systems to provide a flow of information that enables fast delivery of services across national and international territories. But these, and even our personal social media systems and personal appliances, leave us more exposed to potential harm. Nevertheless, there is increasing awareness that the benefits of ICT cannot materialise in a vacuum. The increased number

28

of cybersecurity incidents that cause major economic damage to the global economy and security underscore the need to prioritise measures addressing such threats and promote secure digital services and infrastructure. The landscape of threats can be categorised into three main areas: • The threat to critical infrastructure: due to the increasingly digitalised environment we operate in, it has expanded in scope in comparison to a decade or more ago. Potential damage of this typology of security incidents can cause thousands if not millions of casualties and/or billions of losses; • Online criminal activity (cybercrime) in relation to digital content, ranging from ID theft and non-cash payment fraud, to online terrorist propaganda and child exploitation etc., and last but not least; • Cyber as modus operandi and enabler of many other threats, including hybrid attacks. This is particularly worrisome with the prominence of the crime-as-a-service business model.

The EU Cybersecurity Strategy In the 2013 EU Cybersecurity Strategy and its 2017 revision, it is highlighted that external cyber capacity building is a strategic building block of the EU’s cyber policy. This was also brought forward as a key ingredient in the 2015 European Agenda on Security. It also contributes significantly to creating operational cooperation frameworks between partner countries and the EU (ensuring an internal-external security nexus), which ultimate-


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Interview with Bruce R. Eggers, Andover, MA The Future of European Integrated Air and Missile Defence The Patriot partnership community

5min
pages 50-51

Last but not least

5min
pages 57-60

Conference report by Hartmut Bühl, Brussels Life Support Solutions – Field Camp Services International workshop at Kärcher Futuretech

2min
page 56

Dirk Zickora, Munich The importance of a European Air Power solution The role of space and cyberspace

8min
pages 38-41

Raymond Hernandez, Erkrath No more dead through contaminated water! Potable water – easily produced everywhere

5min
pages 54-55

Round table interview with Patrick Bellouard, Paris, Hans-Christoph Atzpodien, Berlin, and Trevor Taylor, London Germany – a touchstone for the arms export policy of the European Union

18min
pages 44-49

Conference report by Nannette Cazaubon, Paris The EU CBRN Centres of Excellence Initiative 7 th meeting of National Focal Points

5min
pages 52-53

Timo Kivinen, Helsinki Finland promotes an EU defence cooperation Make European forces more operational

6min
pages 42-43

Carlos Bandin Bujan, Brussels We need more efficient cybersecurity building worldwide A transversal issue in development and cooperation

5min
pages 28-29

Rob Wainwright, Amsterdam, and Beth McGrath, Washington The new role of the Defence Chief Information Security Officer (CISO) CISOs are more than technology officers

6min
pages 36-37

Documentation 5G networks, “fake news” and disinformation

5min
pages 32-33

Wolfgang Röhrig, Brussels Cyber defence in the European Union is part of its defence capabilities Cyber strongly influences capability development

5min
pages 34-35

Secunet, Essen NAPMA further expands its SINA Secure Remote Access capability Advertorial

5min
pages 30-31

Peter Martini, Bonn The crucial role of cybersecurity for a resilient energy supply Vulnerability will increase with digitalisation

3min
page 21

Interview with Arne Schönbohm, Bonn Europe needs coherent national strategies and EU operational concepts Make cybersecurity a top priority

12min
pages 24-27

Michael Singh, Washington, DC The world needs the EU as a global player Europe strategic dependence

4min
pages 14-15

Jean-Louis Gergorin /Léo Isaac Dognin, Paris Democracies must learn to withstand, in peacetime, a permanent war in cyberspace Governance remains the number one challenge

8min
pages 18-20

Angelika Niebler MEP, Brussels/Strasbourg How MEPs work to boost Europe’s cybersecurity Cyber resilience is a top issue in the EU

6min
pages 16-17

Roberto Viola, Brussels Taking a cyber leap forward A European response to cyber threats

6min
pages 22-23

Guest commentary by Jean-Dominique Giuliani, Paris Our freedom starts with Hong kong

3min
page 12

Commentary by Hartmut Bühl, Paris Security must be palpable

2min
page 13
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.