CybersecurityMost cybersecurity incidents in Europe remain undetected or not reported
In a new report, the EU cyber security agency takes a snapshot of existing and future EU legislation on security measures and incident reporting; the analysis underlines important steps forward, but also identifies gaps in national implementation, as most incidents are not reported
In a new paper the EU cyber security agency European Network and Information Security Agency (ENISA) takes a snapshot of existing and future EU legislation on security measures and incident reporting. The analysis underlines important steps forward, but also identifies gaps in national implementation, as most incidents are not reported.
Cyber security incidents significantly impact society. Here are five well-known examples:
- In 2012 millions of business network passwords were exposed
- In 2011 the storm Dagmar wrecked millions of Scandinavian communication links
- In 2011 a British data center failure interrupted millions of business communications worldwide
- In 2011 a certificate authority was breached exposing the communications of millions of users
- In 2010 a Chinese telecom provider hijacked 15 percent of the world’s internet traffic for twenty minutes
Each time, millions of citizens and businesses were seriously impacted. Most incidents, however, are not reported or not even detected. Dr. Marnix Dekker and Chris Karsberg, the report’s co-authors, argue: “Cyber incidents are most commonly kept secret when discovered, leaving customers and policymakers in the dark about frequency, impact and root causes.”
An ENISA release reports that the new report, Cyber Incident Reporting in the EU, provides an overview of existing and planned legislation covering the mandatory incident reporting clauses in Article 13a of the Telecom package and Article 4 of the e-privacy directive, the proposed e-ID regulation’s Article 15, and Articles 30, 31, 32 of the Data Protection reform.
The study shows common factors and differences between the articles and looks ahead to the EU cyber security strategy. The paper also identifies areas for improvement. For example, only one of the above-mentioned incidents was within the scope of the national regulators mandate, indicating that there are gaps in the regulation. Thus, EU-wide sharing of incident reports sharing should be improved.
Much progress has been made recently: An ENISA working group for national regulators has developed both a common set of security measures and an incident reporting format. This will enable a more uniform implementation of Article 13a. ENISA just received reports on fifty-one large incidents from the regulators, describing impact, root causes, actions taken, and lessons learnt. This material is used as input for the European cyber security strategy and the European cyber security exercise.
The executive director of ENISA, Professor Udo Helmbrecht, commented: “Incident reporting is essential to obtain a true cyber security picture. The EU’s cyber security strategy is an important step and one of its goals is to extend the scope of reporting provisions like Article 13a beyond the telecommunications sector.”
— Read more in Cyber Incident Reporting in the EU