India's largest platform and marketplace for GCCs, AI & Analytics leaders & professionals

Sign in

⁠India’s largest platform & marketplace for AI & GCC leaders & professionals

3AI Digital Library

European Union to revamp Cybersecurity rules

3AI January 2, 2021

EU last year recorded around 450 cyber incidents involving European infrastructure, notably in the financial and energy sectors, and the pandemic has highlighted Europe’s deep dependence on the internet and exposed security weaknesses.

 The European Union unveiled Wednesday plans to revamp the 27-nation bloc’s dated cybersecurity rules, just days after data on a new coronavirus vaccine was unlawfully accessed in a hack attack on the European Medicines Agency.

The EU last year recorded around 450 cyber incidents involving European infrastructure, notably in the financial and energy sectors, and the pandemic has highlighted Europe’s deep dependence on the internet and exposed security weaknesses.

The EU’s current Network Information System regulations date from 2008, and the European Commission’s new proposals aim to bring them up to date and allow the EU to impose hefty fines on operators who break the rules.

“The time of innocence is over. We know that we are a target,” Commission Vice-President Margaritis Schinas told reporters. “We need to modernize, reinforce, and adapt.”

The plans include an “EU-wide Cyber Shield” linking national security authorities that would use artificial intelligence and machine learning to detect early signs of attacks, a cyber unit to respond to incidents and threats, and beefing up cooperation between countries and with organizations like NATO.

The new cyber-strategy would focus on protecting essential infrastructure like electricity grids, heating systems, gas and hydrogen plants as well as air, rail, water and road links. Financial market and health infrastructure would also be among the priorities.

The EU also wants to bolster its sanctions system related to cyber incidents, with a proposal for countries to agree on sanctions by qualified majority voting rather than unanimity. The Europeans imposed sanctions on people and organizations linked to Russia, China and North Korea this year.
The new plans must now be debated by EU countries and the European Parliament and are likely to change substantially. Once agreed upon, the 27 nations would have 18 months to adopt and start applying the rules nationally.

Picture from freepik.com

    3AI Trending Articles

  • Carlyle is the frontrunner to acquire Mphasis from Blackstone

    Carlyle Group is negotiating with at least half a dozen banks and a pension fund to buy out Blackstone’s stake in Mphasis. Binding offers due today. Mumbai: Private equity firm Carlyle Group has emerged as a probable frontrunner to acquire Mphasis Ltd. from Blackstone Group, in what could be the largest buyout in the Indian IT space, according to people familiar […]

  • Reimagine Business Strategy & Operating Models with AI : The CXO’s Playbook

    Author: Sameer Dhanrajani, CEO at AIQRATE advisory & consulting | AI advisor, business builder | Author | Speaker |Columnist| President at 3AI | Ex-CSO: Fractal, Global Business Leader: Cognizant, Country Head: Fidelity National Financial AlphaGo caused a stir by defeating 18-time world champion Lee Sedol in Go, a game thought to be impenetrable by AI […]

  • Data and Analytics enabled Customer Experience in Supply Chain

    Featured Article: Author: Divya Kalra, Analytics Practice Lead, Philips Background and Context Efficient Supply chains mean provide right product at the right time and right place. The focus of supply chains has always been operational excellence. However, the recent pandemic, chip shortages has forced the supply chains to focus on customer experience as well. The […]

  • Evolution of Biometric Recognition Systems with AI

    Featured Article: Author: Kiranjit Pattnaik, MiQ What are biometric recognition systems Biometric recognition systems are computer-based systems that use an individual’s physical characteristics, such as their fingerprint, voice, face or any other part of the body, to authenticate their identity and grant access to secure areas, systems, or services. They are used increasingly as an […]