Cyber Security Practitioner

Volume: 1 Issue: 9
(December 2015)


News

Members of the European Parliament, EU Council of Ministers and European Commission (‘EC’) have agreed a consensus on the text of the Network and Information Security Directive (‘Directive’) according to EC press releases dated 8 December; for organisations under its regime the Directive will introduce mandatory breach notification and require the implementation of ‘appropriate security measures.’ / read more

The UK Government announced on 25 November that it will commit £1.9 billion over the next five years to cyber security, part of the Government’s new National Cyber Security Plan, details of which were first given by the Chancellor George Osborne in a speech at GCHQ on 17 November. / read more

The EU Agency for Network and Information Security (‘ENISA’) released on 1 December its study ‘Security and Resilience of Smart Home Environments’ (‘Study’), aimed at securing Smart Home Environments (‘SHE’) from cyber threats by highlighting good practices applying to ‘every step of the product lifecycle: its development, integration [...], and its usage and maintenance until end-of-life.’ / read more


Features

I didn’t think that my last editorial of 2015 would be about the imminent adoption of both the Network and Information Security Directive (‘NIS Directive’) and the General Data Protection Regulation (‘GDPR’). The NIS Directive simply needs some rubber stamping by the EU Parliament and Council to become law and if the mood music coming out of Brussels about the GDPR is accurate - and everyone I speak to seems to think it is - then those reforms are virtually sown up as well. / read more

The controversial Prevention of Electronic Crimes Bill was passed by the National Assembly of Pakistan in April, and is currently awaiting approval of the Senate. In this article Ahsan Zahir Rizvi and Sara Ansari of RIAA Barker Gillette delve into the investigative powers introduced in the Bill, and analyse the practical impact of such powers on the citizens of Pakistan through the lens of inter alia the fundamental right to privacy guaranteed by the constitution of Pakistan to all citizens of the country, and question the constitutionality of the provisions of the Bill. With increasing governmental surveillance in Pakistan, Ahsan and Sara also pose questions about BlackBerry’s decision to exit Pakistan and the possible links to the pressures from government regarding the sharing of customer information, and possible privacy violations. / read more

There is little doubt that some are already calling 2015 the ‘year of the cyber breach’ and Stephen Ward of cyber threat intelligence company iSIGHT Partners believes that it is likely that 2016 will be given this moniker too. In the first of a two part article Stephen discusses his view that the reality for cyber security is already pretty dire and the reasons behind his grim take on the current cyber security reality. / read more

The news that employees of Morrisons supermarket chain are to sue their employer after an internal auditor leaked the personal details of thousands of employees online is a reminder of the difficulties that can be caused by the insider cyber threat. Mark Surguy, Partner at Weightmans, discusses the consequences of an insider leak in terms of remedies; firstly, Mark analyses how an insider can be prosecuted in cases such as that of the Morrisons leak, and secondly what rights to compensation exist for those whose personal data has been divulged. / read more

The security of information, whether personal data or company data, is the responsibility of the directors of a company. Such responsibility may be devolved but all roads are always directed and re-directed to those who are charged at the most senior level with the safe custody of the assets of a business. Thomas Bennett, Founder of V Henry & Co, explains why directors are well-advised to look after information and how personal and business consequences follow if they do not. / read more

A problem shared is a problem halved (or so goes the proverb) - today’s cyber threats and the variety of actors perpetrating cyber attacks suggest neither industry nor government can address the risks and defeat the criminals on their own. A collaborative approach based around ‘threat-sharing’ has long been advocated. Predictably, a global solution to this global problem is required yet today there is really only a preponderance of regionalised initiatives. In this piece, Mark Webber and Michael Brown of Fieldfisher look at the notion of cyber threat-sharing to thwart attacks and the EU, UK and US policy and legislative agenda that promotes such sharing. / read more


About Cyber Security Practitioner:

Cyber Security Practitioner, the most recently launched monthly publication from Cecile Park Media, provides a multi-disciplinary view on the cyber security challenges facing global businesses and delivers insight into operational change. It covers cyber security regulation, data breach, data security, cyber risk, cyber crime, ethical hacking, privacy and data protection, cyber infrastructure, technical solutions, risk management, information assurance, security standards, liability, consumer protection, ransomware and other cyber threats, cyber insurance... /read more

Search Publication Archives



Our publication archives contain all of our articles.
Can’t find what you are looking for?
Try an Advanced Search

Log in to cyber security practitioner
Subscribe to cyber security practitioner
Register for a Free Trial to cyber security practitioner
Sign up for e-mail alerts
cyber security practitioner Pricing

Social Media

Follow cyber security practitioner on TwitterView cyber security practitioner LinkedIn Profilecyber security practitioner RSS Feed