The European Union governance structure is empowered to adopt measures with the aim of establishing or ensuring the functioning of the Internal Market in accordance with the relevant provisions of the Treaties. In view of the huge fragmentation of the market for information and communication technologies (ICT), ICT security products and solutions, EU action is needed to achieve a single market in this field, which is also a prerequisite for a well-functioning digital economy.
There are several challenges that need to be faced in order to achieve the goal of a Digital Single Market in the EU. The current 28 EU member states have not been able to compete on a level playing field be-cause of strong leverage of their member state’s own supplier base versus the competition often from outside the EU bloc.
The status of cybersecurity in the EU
Cyberspace is borderless by nature and is increasingly complex, with cyber attacks ranging from denial of service, data breaches and data theft to spying, surveillance and terrorism. In general these are only increasing across all industry sectors and are driving the strong development of countermeasures and investment by technology vendors, industry and governments from all nations. In addition to the threat and need to manage cyber threats, the other key realisation is that strong cyber trust and security is criti-cal to a smoothly functioning trading marketplace. The area of cyber security solutions is a strong growth market. Indeed, the global cybersecurity market is expected to grow to a value of $80-120 billion by 2018. The challenge has been to invest in and to coordinate the EU’s own home grown solutions and vendors, who have struggled to compete with ICT providers from outside their country (and mostly out-side the EU).
The top five vendors control 20.4% of the total market (and they all come from outside the EU).
The EU market has been dominated by a small group of global vendors competing with a high number of smaller European suppliers. The top five vendors control 20.4% of the total market (and they all come from outside the EU). EU suppliers remain mostly national or regional players. Their cumulative market share was estimated at around 16.5% of the total EU Network Information Service (NIS) market reve-nues. The fragmentation of the cyber security supply industry in Europe is a key reason for the recent EU initiatives in terms of cybersecurity regulations.
How to prevent cyber attacks
A key set of takeaways for the cyber practitioner include that cyber security covers a broad set of attack vectors of devices, software applications, networks and data centres and databases that are typically spread across multiple vendors and cloud computing services. “Not one person can know everything” – this is a fast moving area of people and technology developments – there is a need to keep on top of it and a need to have a “joined up approach” between enterprises, public authorities and citizens to drive adoption. “Attack from many sides” – many types of attack potentially come from many gaps opened up in cyber attacks. Lessons from past cyber attacks: The size of data breaches – millions of records and the number of threat points – for example the Russian bank attacks of 2015 was malware introduced by stealth. Zero day attacks (in other words a vulnerability not having been the subject of any known publi-cation implies that no protection exists) are likely to rise in number and cyber is becoming more sophisti-cated.
The need to harmonise the European market
The key is to establish partnerships to manage knowledge and awareness in the EU and other countries and in industry. The rate of change in cyber technology and cyber attacks needs a responsive and progressive approach to keep ahead and to be able to lead the market. The use of EU legislation will move ahead to seek to establish the foundations of a joined up and coordinated response.
Doing nothing would maintain the EU status quo of largely national approaches and would not serve to create a well-functioning European market for cybersecurity products and services.
Article 25 in the Regulation of the European Parliament and of the Council establishing Horizon 2020 provides the legal framework for the establishment of a public-private partnership, the contractual agreement should specify the objectives of the partnership, respective commitments of the partners, key performance indicators and outputs. There needs to be an EU-wide approach to cyber security and the currently limited cooperation among member states needs to be strengthened; and key sectors of the economy would be subject to security obligations following an approach aimed at harmonising the internal market. It is therefore very likely that the implementation of the business requirements under the NIS Directive (network information service) will lead to increased demand for cyber security solutions.
Doing nothing would maintain the EU status quo of largely national approaches and would not serve to create a well-functioning European market for cybersecurity products and services. The EU would thus be unable to respond to growing demand for network information services by EU providers and this would be a missed opportunity for Europe to become a global leader in the field of cybersecurity. For the EU member states, this is the direction of travel for the strategy to deal with the nature of a cyber security world that is borderless and to underpin modern global and local economies across all sectors. Non-EU countries and EU countries both have a vested interest in making this work.
No breakthrough for women’s representation in Ireland’s 2024 general election
Find all related Magazine
Magazine
#Issue 26Progressive Post
#Issue 26
Brace for impact
#Issue 25Progressive Post
#Issue 25
EU 2024: the unpredictable well-known
Issue #24Progressive Post
Issue #24
The future is social
XThis website uses cookies. Some cookies are necessary for the proper functioning of the website and cannot be refused if you wish to visit the website.
Other cookies are used for Advertisement and Analytics (Sharing on social networks, video playing, analysis and statistics, personalized advertising ...) You can refuse them if you want to. REJECTACCEPTCookie settings
Manage consent
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-advertisement
1 year
Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
csrftoken
past
This cookie is associated with Django web development platform for python. Used to help protect the website against Cross-Site Request Forgery attacks
JSESSIONID
session
The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application.
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Cookie
Duration
Description
__cf_bm
30 minutes
This cookie, set by Cloudflare, is used to support Cloudflare Bot Management.
S
1 hour
Used by Yahoo to provide ads, content or analytics.
sp_landing
1 day
The sp_landing is set by Spotify to implement audio content from Spotify on the website and also registers information on user interaction related to the audio content.
sp_t
1 year
The sp_t cookie is set by Spotify to implement audio content from Spotify on the website and also registers information on user interaction related to the audio content.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie
Duration
Description
CONSENT
2 years
YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
iutk
session
This cookie is used by Issuu analytic system to gather information regarding visitor activity on Issuu products.
s_vi
2 years
An Adobe Analytics cookie that uses a unique visitor ID time/date stamp to identify a unique vistor to the website.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Cookie
Duration
Description
NID
6 months
NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads.
VISITOR_INFO1_LIVE
5 months 27 days
A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.
YSC
session
YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.
yt-remote-connected-devices
never
YouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt-remote-device-id
never
YouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt.innertube::nextId
never
This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen.
yt.innertube::requests
never
This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen.