FOLLOW US     
           
    + 34 951 16 49 00    
Spanish Italian English
ERASMUS+

Enanching SMEs' Resilience After Lock Down

EU Framework and Resources for Cybersecurity of SMEs
Descargar    Play Audio
Learning Outcomes

Objectives and goals

At the end of this module you will be able to:

  • Understand the EU cybersecurity policy (its evolution and actors involved)
  • Learn how the EU supports SMEs in the area of cybersecurity
EU Framework and Resources for Cybersecurity of SMEs

SMEs and Cybersecurity in Europe: the context


Warning: file_get_contents(http://188.164.195.236/plesk-site-preview/esmerald.eu/https/188.164.195.236/GQJxotl-5L5DxyKllRZnwcR_9PKwXhdKvaZPCQfeDh_S-asblmkwAiMNVCKSLsmLy9LwaWlGEEbOChm1mxvBrY2Crg9loL2Lwhmu8RS6hKULDFwQgsux9gnDX05tg92DwsktY4OAVxLTrBmDwIQ): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /var/www/vhosts/internetwebsolutions.es/httpdocs/curso.php on line 670

Evolution of the EU cybersecurity policy


Warning: file_get_contents(http://188.164.195.236/plesk-site-preview/esmerald.eu/https/188.164.195.236/IWPxyQp4aBco6bMnlquM54FDN6nx6r1_I4fcxX0JsCK8T5xOnKl4UIQ94G0HhVSdTzJCxjJYtWvJYy9X7G_eD3H4oxuLixlqRa7KvFYP2XyrAYFJq9OOoVA4Nq7sfVXJ-6V6ubcG6-ejnw9EJWg): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /var/www/vhosts/internetwebsolutions.es/httpdocs/curso.php on line 670

Warning: file_get_contents(http://188.164.195.236/plesk-site-preview/esmerald.eu/https/188.164.195.236/dT21US4tnzsuoK7P3il4HGVl4-CWQ3gJnUWkzrjwNFDAFNY2rmNsN3k65TJNl6dgjX7L0qutEk5zeTYU5nbx6N8UNEfdhgtDUkj5k5l2iwRygDgNfikdA9btNBokm_UbLPSZzymJ3vgsUPTeTLw): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /var/www/vhosts/internetwebsolutions.es/httpdocs/curso.php on line 670

EU Institutional architecture in cybersecurity


Warning: file_get_contents(http://188.164.195.236/plesk-site-preview/esmerald.eu/https/188.164.195.236/-XGNTjW0hvov5nClB6WSfg3g-t6vSUsqNLYRGihIVzKHkx3iHT0nc-B6LbVDezE8jHwGVB8l4nKFJjz7wgshIiliFYORguvp4QEgloCiZ94kK4qDJb2xL3llzrNelLKb8En1ya9rDjSa7ME1ajQ): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /var/www/vhosts/internetwebsolutions.es/httpdocs/curso.php on line 670
Strand 1 - Cyber crime Strand 2 - Critical information infrastructures protection (CIIP) Strand 3 - Cyber defence
• Justice & Home affairs mandate • Internal Market mandate • Common Security and Defence Policy mandate
• Protection of cybersecurity internally • Security of essential utilities and services for business continuity Protection of cybersecurity externally
• EU's shared competence • EU's exclusive competence • Intergovernmental issue

 

Level 1
EU institutions
Level 2
EU Agencies
Level 1
Member States

• European Commission
• DG Home
• DG Connect
• European External Action Service (EEAS)
• European Parliament
• EU Computer Emergency Response Team (CERT-EU)

 

• Europol – European Cybercrime Centre (EC3)
• European Union Agency for Cybersecurity (ENISA)
• European Defence Agency (EDA)

 

• National Cybercrime Units
• National CERTs NIS competent Authorities
• National Defence and Security Authorities

 

Source: Christou, G. (2016). Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy

Resources for SMEs


Warning: file_get_contents(http://188.164.195.236/plesk-site-preview/esmerald.eu/https/188.164.195.236/ivTkoYo8Nr1tE-bkDy9Lxa0KmKbouc9CNSJijwIEQpRz0AzD7IFBN3gh1ucOcwUHK7_VhxdNJ5oTCQ9xdYDYOLO_Gl8oFCGoqYXsl4N7EDI8qhqbxVQTD6f6Dz_F66pyobK3obtH5DLcvFyQfsw): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /var/www/vhosts/internetwebsolutions.es/httpdocs/curso.php on line 670

Warning: file_get_contents(http://188.164.195.236/plesk-site-preview/esmerald.eu/https/188.164.195.236/5llTo56pQFAyXCyu6VTSEnw5YnXAo0i_zg7m9ha4tSk72aH1EzeF8TN80xrMoKyj4aEtvq-q5g3_JHq91aJSI_I8B0g6gTE02RTsPIKj0uCnsmFQtyzzLr4prXA_1twIYLiezW_Kh0WO3y6Lnyw): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /var/www/vhosts/internetwebsolutions.es/httpdocs/curso.php on line 670

Warning: file_get_contents(http://188.164.195.236/plesk-site-preview/esmerald.eu/https/188.164.195.236/Sr6_OgK4C_fXSnNzdWxlGRp6hr94R617MfuLnmbeUd5XVFSdY_B5ZoowLz5yL9Q0T0LmIQQQxn2lYF82HohG_KP_5fPHB2r1eoQgtgscC0HykslO-I9JWncBorA-Nbgq99DWHVpR3YmjnqojA08): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /var/www/vhosts/internetwebsolutions.es/httpdocs/curso.php on line 670

• European Union Agency for Cybersecurity (ENISA) supports European SMEs on cybersecurity since 2006.

• Information Packages, reports, guides, guidelines on cybersecurity for SMEs freely available on the ENISA website. Some examples:

Conclusions

Key takeaways

  • The European Union has increased its competences in cybersecurity over the last few years
  • Cybersecurity is a multi-layer policy involving several actors both at national and EU level
  • ENISA supports actively European SMEs in cybersecurity

 



Keywords

Cybersecurity, European Union

Objectives/goals

• Understand the EU cybersecurity policy (its evolution and actors involved)
• Learn how the EU supports SMEs in the area of cybersecurity

Description

SMEs are the backbone of the European economy and they have been increasingly the target of cyber-attacks. In the last decades, the EU has increased its engagement and competencies in cybersecurity. This module will help to understand better how the EU deals with cybersecurity and which resources have European SMEs to face the challenges from cyber-attacks.

Bibliography

Carrapico, H., & Farrand, B. (2020). Discursive continuity and change in the time of Covid-19: the case of EU cybersecurity policy. Journal of European Integration, 42(8), 1111-1126.

Christou, G. (2016). Cybersecurity in the European Union: Resilience and adaptability in governance policy. Springer.

ENISA (2021), Cybersecurity for SMEs

ENISA website, Link: https://www.enisa.europa.eu/ 

Verizon (2019), Link: https://enterprise.verizon.com/resources/reports/dbir

Whyte, C. (2021). European Union: Policy, cohesion, and supranational experiences with cybersecurity. In Routledge Companion to Global Cyber-Security Strategy (pp. 201-210). Routledge.