Anda di halaman 1dari 4

Interview

Interview with Neelie Kroes about Trust


and Security in the Digital Agenda
This article is the transcription of the interview of the PvIB board members with mrs. Kroes. You can send your comments to board member
Thom Schiltmans, by email to thom.schiltmans@gmail.com

The next boardmembers of PvIB were What is the vision of Mrs. Kroes on ‘net allow use of certain ICT fora and
involved in this interview with Mrs. Kroes: neutrality’? consortia standards.
Thom Schiltmans, Philips Healthcare,
Sector IT Security Manager; board member •W
 hat is the definition of ‘net neutrality’ NIST, the National Institute of Standards
PvIB Education by Mrs. Kroes? and Technology, defines standards on infor-
•W
 hat are the limitations on ‘net mation security. The NIST standards are
Fred van Noord, Verdonck, Klooster & neutrality’ in the vision of Mrs. Kroes? available for free. The Dutch government
Associates, Management consultant uses NIST standards for several purposes and
information security & risk management; NB. Recently Chili was the first country in also the industry uses NIST standards.
chairman PvIB the world to approve a law which guarantees
‘net neutrality’. Are there any possibilities for using NIST
Tom Bakker, Delta Lloyd Group, Group standards by the EU in the opinion of Mrs.
Security Officer / Business Continuity Answer Mrs. Kroes: The European Commis­ Kroes?
Coordinator; board member PvIB, editor sion is committed to preserving the open
PvIB-magazine “Informatiebeveiliging” and neutral character of the Internet in Answer Mrs. Kroes: Yes, but the answer is
Europe. But traffic management and net more complicated than that. The European
Erno Duinhoven, Capgemini, Managing neutrality are highly complex issues and Commission supports use of both European
consultant information security & risk the terms mean different things to dif­ and international standards. We think this
management; board member PvIB ferent stakeholder groups. In any event, it is key to competition and competitive
Professionalizing. is clear that full and effective transparency industries - and the priority is good and
is essential to enable consumers’ choices. widely-used standards. But our main role is
Implementing the ambitious Digital Agenda Consumers should be able to access the to promote the use of standards rather
for Europe would contribute significantly to content they want while content providers than to endorse particular standards. NIST
the EU’s economic growth and spread the and operators should have the right incen­ supporters should work within CEN,
benefits of the digital era to all sections of tives to keep innovating and investing. CENELEC and ETSI at European Level and
society. The Agenda outlines seven priority ISO, IEC and ITU at international level to
areas for action: creating a digital Single The revised EU telecoms framework adopted promote NIST. If a NIST standard is ac­
Market, greater interoperability, boosting in 2009, which comes into force in May cepted by the ISO, for example, the
internet trust and security, much faster 2011, already contains strict transparency standard would then become European
internet access, more investment in re­ requirements and grants national regulators through the Vienna Agreement.
search and development, enhancing digital the power to set minimum quality levels for
literacy skills and inclusion, and applying network transmission services in coopera­ Key action 6 and 7: Present in 2010
information and communications techno­ tion with the Commission. measures aiming at a reinforced and
logies to address challenges facing society high level Network and Information
like climate change and the ageing Member States are still implementing the Security Policy, including legislative
population. EU telecoms rules into their national initiatives such as a modernized
legislation and the Commission is closely Euro­pean network and Information
Trust & Security, one of the priorities in the monitoring the situation concerning poten­ Security Agency (ENISA), and measures
Digital Agenda, is of special interest for tial net neutrality issues. Moreover, we are allowing faster reactions in the event of
information security. In this interview you stimulating debate and examining the cyber attacks, including CERT for the EU
find the answers on the questions we asked contributions to a public consultation institutions.
Vice President Neelie Kroes, Commission (which we ran from end June to end
Vice-President for the Digital Agenda on September 2010), and we will report to the Present measures, including legislative
several key-actions. We related our European Parliament and public about the initiatives, to combat cyber attacks
questions (italics) to key actions results. against information systems by 2010,
(bold) in the Digital Agenda. and related rules on jurisdiction in
Key action 5: As part of the review of EU cyberspace and international level at
Key-action 1: Simplify copyright standardization policy, propose legal 2013.
clearance, management and cross-border measures on ICT interoperability by
licensing. 2010 to reform the rules on implemen- Trust and security is related to the proven
tation of ICT standards in Europe to knowledge and skills of people who are

14 • • • • • • Informatiebeveiliging december 2010


active using the internet. In the digital well-known career ladders. Through such when they connect online. Besides, some
agenda we did not find any actions on tools ICT professionals can plan better and of the most innovative and advanced
creating user security awareness. make smart choices. online services - such as eBanking or
eHealth - would simply not exist if new
Does the EU have any plans or action on the The European Commission is committed to technologies were not fully reliable.
introduction of a internet driver license (or developing tools to identify and recognise
internet data license)? the competences of ICT practitioners and This is why the Digital Agenda for Europe
users by 2012. These should be developed contains key actions to allow faster
Answer Mrs. Kroes: No. The key objective in connection with the European Qualifica­ reactions and combat cyber attacks against
of the Digital Agenda is to promote access tions Framework (EQF) and EUROPASS, so information systems. An integrated EU
to the Internet, not to restrict it. We do as to make national qualifications more approach is required because of the inter­
not want the entire Internet to become a mutually recognised across Europe and to national dimension of the problem. We
walled garden. But it is true that we must promote the mobility of information secu­ have to achieve a common consensus on
work towards increasing user awareness of rity professionals. the priorities in terms of public policy and
safety issues. Banks for example are well- of operational deployment. In this way, we
placed to work with citizens to give them As to a publicly available registry, I wonder will add value to national programmes and
both services they want online and training whether this would not be better organised be able to engage third countries and
they need to feel confident in using them. at the level of PvIB and your sister international organisations to develop a
For example, the UK Cabinet Office has organisations? set of principles reflecting European core
worked with industry in partnerships for a values.
number of years to achieve such outcomes, In the opinion of Mrs. Kroes, does the EU on
and now these have developed into indus­ itself have the power to face cybercrime or This is where ENISA (European network and
try-driven projects like Bank Safe Online are there any thoughts on working together Information Security Agency) comes in.
(see http://www.banksafeonline.org.uk/). with other large economies / countries? ENISA’s job is not to maintain security on
The Commission is keen to promote such behalf of Member States, but to help them
partnerships and best practice. • Which relation does Mrs. Kroes see in the work together to both strengthen the wea­
current lobby of the US government in kest links in the chain, and to lift security
The UK government supports the qualifica- counterfighting cybercrime? in general. In practice that means EU-wide
tion of information security professionals on training exercises and working more closely
a wide area (www.instisp.org). Also within with Europol and Interpol, for example.
the Netherlands are initiatives for qualifica- ENISA can only be as strong as the working
tion and certifications of information secu- relationships it and Member States can
rity professionals in a wide area of their develop with each other.
profession.
What does Mrs. Kroes see as the most
Does the EU have any plans on having to dangerous developments and threats in
meet any international recognized qualifica- cybercrime which have to be dealt with
tion for information security professionals? at EU level?

• What are the advantages in meeting inter- • Which low effort countermeasures will
national recognized qualification for infor- have the largest effect on the safety of
mation security professionals in the the ICT infrastructure and the internet
opinion of Mrs. Kroes? (low-hanging fruit)?
• Does the EU want a publicly available
registry for information security profes- Answer Mrs. Kroes: There are widely vary­
sionals which public consultation is pos- ing opinions on the extent of the threat
sible, similar to healthcare workers in the from so-called “cyber-war”, or cyber-threats
Netherlands (BIG-registry, a registry for in general. The Internet is generally re­
professionals working in healthcare), and markably robust - but there are no guaran­
if what are the main reasons in the Answer Mrs. Kroes: The importance of the tees it will stay that way if we grow com­
opinion of Mrs. Kroes for (not) wanting different elements making up the Internet placent. IT networks and end users’ termi­
such a registry? is sometimes perceived in very different nals remain vulnerable to a wide range of
• Does EUROPASS provide in qualifications ways. This partly explains the diversity of evolving hazards: from identity theft to
for information security professionals on a governmental positions expressed in spam spreading a wide range of viruses and
wider area then a pure technical area? international fora and the sometimes malicious software. Attacks are becoming
contradictory appreciations of the urgency increasingly sophisticated (trojans, bot­
Answer Mrs. Kroes: In order to attract of this matter. Cyber security is vital for nets, etc.) and often motivated by financial
good people to working with ICTs, in both the European economy, to protect the gain, but they can also be politically moti­
the private and public sectors, it is very businesses and operations of ordinary vated as shown by recent cyber-attacks
important to have skills frameworks and citizens. Users must be safe and secure that targeted Estonia and Lithuania.

Informatiebeveiliging december 2010 • • • • • • 15


Clearly more effort is needed to prevent the Moreover, national PPPs are now being How can the security and privacy within
next Estonia-type situation. Cross-border enriched by the European Public-Private solutions like national Electronic Medical
threats demand cross-border coordination, Partnership for Resilience (EP3R) launched Record Systems profit from this increase of
it’s as simple as that. The first EU‑wide by the European Commission under the ICT R&D budget so that convincingly can be
cyber security preparedness exercise is CIIP (Critical Information Infrastructures proven for everyone that this kind of solu­
taking place in November 2010: that Protection) action plan of 2009. In ad­ tions can be implemented securely and still
should provide a better understanding of dition to the existing national initiatives provide the benefits for EU and national
the extent of threats and remaining weak and the operational activities of ENISA, the healthcare?
points in networks and information sys­ EP3R will support the exchange of informa­
tems. The next steps are effective and rapid tion and knowledge on specific topics with • What are the advantages and disadvan­
implementation of the EU action plan for an EU and international dimension. It tages of self-control by the civilians in the
the protection of critical information infra­ should foster the involvement of the opinion of Mrs. Kroes in the possibility in
structure and of the Stockholm Programme private sector in the definition of strategic managing authorizations on his/her own
(which is under the responsibility of my public policy objectives as well as operatio­ files and be given access on the log files
colleague Cecilia Malmström). nal priorities and measures in order to to see which medical professionals have
bridge the gap between national policy- had access to the medical files?
With the EU institutions a Computer Emer­ making and operational reality on the
gency Response Team or “CERT” is clearly ground. Answer Mrs. Kroes: eHealth systems use
needed. the power of ICTs to enable patient
An efficient network of CERTs should be empowerment and better care. In particular
Interview with Neelie Kroes about Trust and Security in the Digital Agenda

The internet infrastructure is mainly in the established in Europe. That is why ENISA is they can provide better information both
hands of private companies. What is the already mobilising and supporting Member to patients and to healthcare professionals
opinion of Mrs. Kroes on the cooperation States in completing the establishment of as well as give personalised guidance,
between the large amount of private held their own national CERTs. which can improve illness prevention and
companies, the national governments ant chronic disease management. At the same
the EU in fighting cybercrime? The EP3R should also address the needs time, fast and secure access to personal
and procedures to ensure information ex­ health data can help greatly in cases of
• What is the role of market parties in the change to prevent and prosecute cyber­ urgent need for medical intervention any­
fight against cybercrime? crime. Finally, it is important that interna­ where in the EU.
• What is the vision of Mrs. Kroes for pubic/ tionally coordinated actions which target
private partnership in fighting cybercrime? information security are pursued and joint A good example of this is the epSOS large
action is taken to fight computer crime. scale pilot. epSOS aims to develop, test
Answer Mrs. Kroes: Cybercrime is every­ and validate patient summaries and
one’s responsibility. The EU is supporting Key action 9: Leverage more private ePrescription solutions across borders. The
ICT-based public private partnerships investments through the strategic use of project has identified the pilot sites which
(PPPs) with €1 billion to leverage around precommercial procurement and public- will run the services and in November
€2 billion of private spending by 2013. private partnerships, by using structural 2010, we will launch a testing event open
to all companies willing to implement the
specifications defined by the project. In
practice, this could mean that an EU
citizen on holiday could be treated abroad
by a doctor who has access to potentially
life‑saving information.

However, citizens will only use new techno­


logies and e-services if they trust that their
personal data, especially sensitive data
related to health, is safe. Current technolo­
gies could ensure the appropriate level of
security and privacy from a technical point
of view, but the main issue is at the legal
and organisational levels of implementa­
tion. Legislation needs to offer cross border
services with a harmonised level of security
and privacy. In addition, the processes and
responsibilities at all levels of organisa­
PPPs are designed to establish European funds for research and innovation and by tions (public and private, governments and
leadership in future strategic technologies maintaining a pace of 20% yearly health care providers) need to enforce and
that will help to stay ahead of challenges in­crease of the ICT R&D budget. ensure the targeted level of security and
like tomorrow’s information infrastructure. privacy. For this reason, the ongoing review

16 • • • • • • Informatiebeveiliging december 2010


of the data protection regulatory framework Key action 12: Access by 2012 whether high level principles to be implemented at
aims to modernise all relevant legal instru­ the ICT sector has complied with the EU level, by which smart grid operators
ments to meet the challenges of enhancing timeline to adopt common measurement could design their systems and processes.
trust and confidence by strengthening methodologies for the sector’s own We support the view that there is a need to
citizens’ rights. In parallel, under the Digi­ energy performance and greenhouse gas distinguish between individual consumers
tal Agenda we will launch a set of actions emission and propose legal measures if and aggregated technical data (used for
to strengthen further the network and appropriate. grid management) to minimise the vulnera­
information security policies. bility of private data. As transmission is so
A large number of information security vulnerable from a privacy point of view
What is the optimal rate between invest- professionals are worried about smart energy more work will also need to be done to
ments in information security and other meters. clearly assess the most appropriate encryp­
parts of ICT in the ICT R&D budget? tion measures to be used.
• What are the guarantees of the EU to
Answer Mrs. Kroes: This is not a figure security and privacy for smart energy This interview with Neelie Kroes, Commis­
that can be written in black and white meters? sion Vice-President for the Digital Agenda
terms. Every year, the ICT programme was based on the English version from
committee, the ICT advisory group and Answer Mrs. Kroes: The right to privacy 19.05.2010. Since 26.08.2010 the trans­
other preparatory stakeholder consultations and to the protection of personal data are lated Dutch version is available on
define priorities which determine the ICT fundamental rights in the EU which we take http://eur-lex.europa.eu/LexUriServ/
R&D calls for proposals. We are then bound very seriously. We recognise that there are LexUriServ.do?uri=CELEX:52010DC0245(01):
by the quality of the proposals we receive. potential privacy and security concerns EN:NOT.
Better proposals obviously mean more when introducing smart meters and we
chance of funding. So while trust and surely want to avoid them. But we must See also: http://ec.europa.eu/informa­
security improvements matter, they are also make sure that people get informed tion_society/newsroom/cf/itemdetail.
competing with other priorities. For about their energy use and empower them cfm?item_id=5826 for the Digital Agenda
example, there is no point in securing a manage their consumption. , Moreover, and related documents. On http://ec.eu­
network or service that doesn’t exist, so smart metering will support the roll out of ropa.eu/information_society/newsroom/cf/
these aspects of ICT also need funding. smart grids. The banking and payment card pillar.cfm?pillar_id=45 you can find the list
industries may offer valuable lessons how of specific actions to enhance trust and
to approach this, by developing a list of security within the European Union.

Informatiebeveiliging december 2010 • • • • • • 17

Anda mungkin juga menyukai