Abstract
National Cyber Security Strategies (NCSS) are the main documents of MS to set strategic principles, guidelines, and objectives and in some cases specific measures in order to mitigate risk associated with cybersecurity. To encounter existing and emerging cybersecurity threats, EU Member States and EFTA countries are required to evolve and adapt their cybersecurity strategies frequently. In July 2016, the European parliament voted the adoption of the Directive on Security of Network and Information Systems (the NIS Directive). Among other measures, the NIS Directive requires the EU Member States to adopt and implement a national strategy on the security of network and information systems (national NIS strategy). Member States may request the assistance of ENISA in developing national NIS strategies.
ENISA is supporting the EU Member States and EFTA countries since 2012. For this reason, ENISA has published several studies regarding the development, implementation, and evaluation of the NCSS. ENISA has also created several tools like online tutorial videos and an online interactive map that stores all the developed NCSS of EU MS together with their strategic objectives and examples of good practices. More information regarding ENISA’s work on NCSS will be further analyzed in Chap. 5 “ENISA’s Contribution to National Cyber Security Strategies” of this book.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Directive (EU) 2016/1148: http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.194.01.01.ENG&toc=OJ:L:2016:194:TOC.
NCSS map: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map.
ENISA (2012): Good Practice Guide on National Contingency Plans for CIIs, available on request.
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material
IT-Security Act (2015).
Federal Chancellery of the Republic of Austria (2013): Austrian Cyber Security Strategy. Available online at https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/AT_NCSS.pdf.
French Senate (2013): Loi de programmation militaire 2014–2019.
ENISA (2010): The new user’s guide: How to raise information security awareness. Available online at http://www.enisa.europa.eu/activities/cert/security-month/deliverables/2010/new-users-guide.
See, for instance, the proposal for a regulation ‘on electronic identification and trusted services for electronic transactions in the internal market’.
http://ec.europa.eu/information_society/policy/esignature/eu_legislation/regulation/index_en.htm.
McKinsey Quarterly (2014): The rising strategic risks of cyberattacks. Available online at http://www.mckinsey.com/business-functions/business-technology/our-insights/the-rising-strategic-risks-of-cyberattacks.
ENISA’s web page on baseline capabilities for national / governmental CERTs: http://www.enisa.europa.eu/activities/cert/support/baseline-capabilities.
Center for Cyber Security (2015): The Danish Cyber and Information Security Strategy. Available online at https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/national-strategy-for-cyber-and-information-security/at_download/file.
ENISA (2011): Cooperative Models for Effective Public Private Partnership – Good Practice Guide. Available online at https://www.enisa.europa.eu/publications/good-practice-guide-on-cooperatve-models-for-effective-ppps/at_download/fullReport.
ENISA (2016): Stocktaking, Analysis and Recommendations on the protection of CIIs. Available online at https://www.enisa.europa.eu/publications/stocktaking-analysis-and-recommendations-on-the-protection-of-ciis.
Secretariat of the Security and Defence Committee (2013): Finland’s Cyber security Strategy. Available online at https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/FinlandsCyberSecurityStrategy.pdf.
Stocktaking, Analysis and Recommendations on the protection of CIIs: https://www.enisa.europa.eu/publications/stocktaking-analysis-and-recommendations-on-the-protection-of-ciis.
For a good practice guide on Cooperative Models for Effective PPPs see: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/public-private-partnership/national-public-private-partnerships-ppps/good-practice-guide-on-cooperatve-models-for-effective-ppps.
National Cyber Security Strategies: An Implementation Guide: https://www.enisa.europa.eu/publications/national-cyber-security-strategies-an-implementation-guide.
ENISA (2014): An evaluation framework for Cyber Security Strategies. Available online at https://www.enisa.europa.eu/publications/an-evaluation-framework-for-cyber-security-strategies.
ENISA (2016): NCSS Good Practice Guide. Available online at https://www.enisa.europa.eu/publications/ncss-good-practice-guide.
NCSS Training Tool: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/national-cyber-security-strategies-training-tool.
ENISA (2017): National Cyber Security Strategies Map. Available online at https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map.
ENISA Report on Information Sharing and Common Taxonomies between CSIRTs and Law Enforcement Agencies: https://www.enisa.europa.eu/news/enisa-news/enisa-report-on-information-sharing-and-common-taxonomies-between-csirts-and-law-enforcement-agencies.
ENISA study into taxonomies for incident detection and prevention: https://www.enisa.europa.eu/news/enisa-news/enisa-study-into-taxonomies-for-incident-detection-and-prevention.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Liveri, D., Sarri, A., Darra, E. (2018). ENISA’s Contribution to National Cyber Security Strategies. In: Bartsch, M., Frey, S. (eds) Cybersecurity Best Practices. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-21655-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-658-21655-9_5
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-21654-2
Online ISBN: 978-3-658-21655-9
eBook Packages: Computer Science and Engineering (German Language)