In December 2020 the European Commission published a proposal to repeal the current NIS Directive (European Directive on Network and Information Systems) and to replace it with a new Directive: the so-called NIS-2 Directive. This post will give an update on the status of negotiations of NIS-2, and will outline the aspects we already know and don’t know about the upcoming Directive’s final form.
2013: KBC, the first European financial institution to move to O365 – Webinar 27 May 2020
27 mei 2020 – Cyber Security Coalition
In the webinar Roel Wouters took us back to 2011 when KBC decided to move to O365 in search of a less complex and more performing environment. Hence, KBC was already well prepared for the ‘new way of working’ that has now been generally accepted due to Covid-19. This Cloud migration, which was legally regarded as outsourcing, led to an open and transparent discussion among the National Bank of Belgium, KBC Group and Microsoft. The Compliance programme set up by Microsoft was born from this. After the migration in December 2013, other Cloud initiatives quickly emerged. A Cloud governance was implemented whereby the Cloud Enablement Forum plays a pivotal role. The experts in this mandatory advisory body emanate from various business, risk and IT disciplines and guide each Cloud case from cradle to grave. The Cloud is now clearly embedded in KBC’s strategy: Cloud alternatives have to be explored for each business case and there is a clear trend to use more SaaS & PaaS solutions, also for own (preferably Cloud native) development. The acquired Cloud experience is seen as a critical success factor in order to achieve KBC’s ambition to be a leading innovative, digital financial player.
Ransomware – today’s universal cyberworry – is but one aspect of a crime: cyber extortion. Orange Cyberdefense provides some insights into this scourge, based on its ‘Security Navigator 2022’-report.
The Cyber Security Coalition and top cybersecurity trainer SANS Institute joined forces to provide specially needed insights and recommendations on successful cloud security, as well as how to handle cyber security in these times of war.
It is easy to drown in the sea of dire warnings about the danger of AI, in particular to our privacy. The main point is that AI in good trust is possible, but requires solid, long term and well-structured approaches. This session of the Privacy focus group offers some crucial insights and welcome examples.
On computer security day we pay tribute to Ada Lovelace, the forgotten mother of the computer. Often described as the first computer programmer — before computers were even invented — Ada was a real visionary. Imagine what she might have achieved had Babbage actually built his “computer” and she hadn’t died at the age of 36.