In the fourth Cyber Security Coalition Privacy Focus Group/Beltug webinar, Daniël Du Seuil took the empowerment of the data subject beyond the protection as guaranteed by today’s GDPR. As convenor of the European Self-Sovereign Identity Framework (ESSIF), part of the European blockchain efforts, he discussed ways for the data subject to (re)gain control over his/her data.

In his clear and precise presentation, he presented models how to create more efficient digitalized data- and workflows, with subject-controlled minimal use of data, shared in an environment of proven trust, even across national borders. It will provide scalable solutions, avoiding a spaghetti-like confusion of gateways and point-to-points links.

Rather than simply an interesting future dream, the ESSIF is already on version 2 of its specifications, with pilots scheduled for late 2020/early 2021, and components being built. Furthermore, the ESSIF initiative aims to fit in with existing public/government and private sector infrastructure. However, plans for a full transition will be proposed. And obviously, this model opens new opportunities for European companies to build ‘wallets’ and other solution elements.

The bottom line is clear: rather than the data subject being the junior party, he/she regains the ownership of data, with equally powerful control over consent, and over access to and exchange of data. Get a head start on the future, check this presentation.

 



Other blog posts

NIS-2: Where are you?

In December 2020 the European Commission published a proposal to repeal the current NIS Directive (European Directive on Network and Information Systems) and to replace it with a new Directive: the so-called NIS-2 Directive. This post will give an update on the status of negotiations of NIS-2, and will outline the aspects we already know and don’t know about the upcoming Directive’s final form.  

SANS Experience Sharing Event

The Cyber Security Coalition and top cybersecurity trainer SANS Institute joined forces to provide specially needed insights and recommendations on successful cloud security, as well as how to handle cyber security in these times of war.

Privacy Focus Group – Practical AI Use Cases

It is easy to drown in the sea of dire warnings about the danger of AI, in particular to our privacy. The main point is that AI in good trust is possible, but requires solid, long term and well-structured approaches. This session of the Privacy focus group offers some crucial insights and welcome examples.

30 November: Computer Security Day: Ada Lovelace

On computer security day we pay tribute to Ada Lovelace, the forgotten mother of the computer. Often described as the first computer programmer — before computers were even invented — Ada was a real visionary. Imagine what she might have achieved had Babbage actually built his “computer” and she hadn’t died at the age of 36.


Share this useful content with friends: