U bent hier

dcypher verenigt onderzoekers, docenten, producenten, gebruikers en beleidsmakers in Nederland om kennis en kunde over cyberveiligheid te verbeteren

Impressie National Cyber Security Summmer School NCS32017

Cybersecurity hoogleraren vrezen dat Nederland digitaal onder water komt te staan!


Launch of a new research agenda for a safer societyThe National Cyber Security Research Agenda, 3rd edition (NCSRA-III), will be presented at June 5th 2018 during an iPoort session in Nieuwspoort in The Hague. If you are able to join, please register here. Program of the afternoon4:30 - 5:00 Reception 5:00 - 5:10 Introduction by Peter Zinn, session chairman5:10 - 5:15 Presentation by professor Governance of cybersecurity TUD, on behalf of the board of editors5:15 - 5:25 Handing over the ‘NCSRA-III by Jan Piet Barthel, director dcypher, to Stan Gielen (NWO), Henk Jan Vink (TNO) and Patricia Zorko (J&V)5:25 - 5:40 Short reaction on the receipt of the agenda by Patricia Zorko (on behalf dcypher supporting ministries), Stan Gielen (on behalf of NWO domains supporting cybersecurity research) and Henk Jan Vink (on behalf of TNO)5:40 - 6:25 Panel discussion led by the Chair Peter Zinn with:Marc Witteman CEO RiscurePatricia Zorko director Cyber Security Ministry of Justice and SecurityStan Gielen president of the Executive Board of NWOKees Verhoeven Member of ParliamentHerbert Bos professor Systems Security VU 6:25 - 6:30 Conclusions by Peter Zinn Chair of the Day6:30 - 7:00 Drinks & Bites 
The rise of IoT botnets – why cyber hygiene remains an issue    by Karine e Silva, PhD Candidate BotLeg Project/ TILT, TiUYou may not be aware, but your device’s processing power could be launching an attack somewhere in the world right now. Put differently, your device could be part of a botnet, a network of compromised devices manipulated from a remote location. The interesting part is that, contrary to infections that bug the owner of the device, a botnet is almost unnoticeable to the host. The infection is made to run in the background, without hurting the normal functioning of the system. Sophisticated forms of botnets continue to be one of the most pervasive threats to the stability of the Internet and its spread to other areas of technology are worrisome.The spread of Mirai, the first large-scale IoT botnet publicized, spawned a turmoil in the cybersecurity community. Although IoT devices had long been reported as a ticking bomb: the level of security embodied in the technology was questionable and a spur of threats against IoT was envisioned. In 2016, Mirai emerged as a powerful, remote network affecting cameras and routers, causing massive disruptions worldwide. The attacks emerging from Mirai paralyzed more than 900.000 Deutsche Telekom customers, a prominent cybersecurity website, and the telecommunications infrastructure of Liberia. Several developments made these outages possible, including the leaking of the Mirai source code, what allowed other cybercriminals to create powerful and resilient versions of the original botnet. By November 2016 Mirai had already compromised a total of 5 million devices and new forms of the botnet have emerged since. The IoT is part of our daily lives and is expected to become a natural, embedded infrastructure at the root of the simplest activities. Smart fridges, ovens, cars, wearables, etc., aim to minimize the burden of decision making and help us minimize the time we spent in repetitive tasks. The wonders (and pitfalls) of IoT come entrenched in the challenges that we have long faced in other connected environments. Various elements make the Internet a prolific environment for threats, but I will focus on two. One, cybersecurity standards, especially those practiced in the IoT, are criticized for being insufficiently low. Two, users make poor cybersecurity decisions in their work and home environments for lack of better understanding, training, and rational constraints. This brings me to the discussion of cybersecurity as a shared responsibility. The theory of cybersecurity is marked by the concept of shared responsibility. In cybersecurity literature, multistakeholderism is a pre-requisite for successful cybersecurity. This concept that cybersecurity is a collective effort is grounded on the fact that the functioning of the Internet is made possible by public and private infrastructures. The Internet is managed a large variety of actors, making it a special case when it comes to critical infrastructure. These multistakeholders, each at their own stance, can influence the outcome of a security threat based on the decisions made at their control level. When we think of digital environments, multiple actors perform both the role of regulator and regulated agent: they are at the same time managing a network and defining how the network will operate. This phenomenon has a unique potential: those who manage networks (such as Internet intermediaries) have an actual regulatory position and can influence how we experience cybersecurity (for the good and for the bad). Following the premise of multistakeholderism, States, businesses, and citizens alike are called upon to exercise their fair share of responsibility and will be held accountable (legally or morally) for failing to meet these standards. In the EU, States carry out the responsibility for implementing cybersecurity legislation and monitoring its application. Businesses are bound by national and EU regulation determining the technical standards of cybersecurity to be observed in the development of products. Likewise, procedures are responsible for reporting security incidents and respect the protection of our personal data. But it does not end here. We are reasonably expected to keep our devices up to date. Individuals must refrain from engaging in activities that undermine public security. The moment our personal devices become a host cell, we become a vector of cybercrime, and undermine the efforts made by other stakeholders in the chain. In sum, cybersecurity is a goal that is only achievable as long as all actors involved take ownership of their fair share (of the problem and the solution). The final question is: how are we, as a community, contributing to cybersecurity? As individuals, we may not have a direct legal obligation to update our devices, search for secure ways to transmit data, or invest in personal cybersecurity devices. But we still have the moral duty to make decisions that are in the benefit of our community and to avoid becoming a liability for others. So, what are you giving back to our Internet community? 
On 5 June, the third edition of the National Cyber Security Research Agenda (NCSRA-III) will be presented. On Thursday 12 April, cyber security researchers and experts from universities, government institutions and companies discussed the final refinements to this new research agenda in the area of digital security. Computer viruses, hijacked computers, hacking, DDoS attacks, phishing and digital espionage are all threats to the digital security of citizens, companies and governments, and they reach the news headlines almost every week. As we have become increasingly dependent on digital services in our everyday lives over the past two decades, we have also become more vulnerable to such attacks.Cyber security researchers are developing new security systems to protect the Dutch digital society. The National Cyber Security Research Agenda (NCSRA) is intended as a framework for public-private partnership within national research into digital security. The agenda was published for the first time in 2011 and was followed by a second edition, NCSRA-II, in 2013. Five years after the second edition, considerable effort is being put into the realisation of a third edition, NCSRA-III. On Thursday 12 April, stakeholders discussed the draft texts of the agenda that were written earlier this year. The 90 participants included many academic researchers, but also experts from industry (including Philips, KPN, NXP, Secura and Rabobank) and representatives from government ministries, TNO, the Confederation of Netherlands Industry and Employers, the Dutch police and the Dutch judiciary.The NCSRA-III is subdivided into five pillars: better design, better defense, better organisation, better understanding of attacks, and improved privacy. For each pillar, the agenda clearly states what the relationships with the other pillars are. 'The agenda that was published five years ago was more compartmentalised', says chair of the event Wim Hafkamp, chief information security officer at Rabobank (and chair of the dcypher advisory council). At the time, we had nine themes that were largely studied independently. The world has changed since, and we are trying to respond to that by clearly considering the relationships between the five pillars. One example of the difference between the new agenda and the previous edition is that we now pay more attention to the psychological aspects of cyber security, for example the change of behaviour; we no longer examine just the technical aspects.'Jaap-Henk Hoepman, principal scientist of the Privacy & Identity Lab, states two ways in which the playing field for digital security has changed over the past five years: 'First of all, our society has become far more dependent on ICT than it was five years ago.'Second, it is better if we now assume that there is no such thing as an entirely secure digital infrastructure. Instead, we should assume that systems have been attacked and that the attacker has access. If this is the case, how can we best protect ourselves?After a plenary session in which the five research pillars were each briefly introduced by a university researcher, the rest of the afternoon was used for discussions. Two successive discussion rounds were organised for each pillar, so that each participant could comment on two of the pillars. At the end of the afternoon, the discussion leaders reported on the most important comments and remarks.The Pillar "Better design" assumes the idea that many security problems can be prevented by designing systems and services where security is one of the priorities from the outset: this is called security by design. When he presented this pillar, Erik Poll from Radboud University noted that, in recent years, everybody has been talking about security by design, but that far too little has been done about it in practice. An important point that emerged from the discussion round is that the end-user, in particular, should not be forgotten. The pillar "Better defense" is about preventing and detecting attacks, but also about responding to and recovering from attacks. The main challenge here is to efficiently and effectively increase the strength of all defensive resources, says Luca Allodi from Eindhoven University of Technology. "Better governance" is the third pillar. This pillar focuses on the owners of systems and services, namely citizens, companies and government bodies. How do they deal with the available technical possibilities to improve digital security? This pillar attracted the most discussion participants by far, including participants from TNO, the Confederation of Netherlands Industry and Employers, the Dutch police and the Dutch judiciary. Several comments concerned the concept of "security". Security has a subjective component, which is not objectively measurable by definition. But in addition, relatively few hard facts and data are available about the measurable component of security.  Kees Neggers, former director of Surfnet and one of the four Dutch people who have been included in the Internet Hall of Fame, expressed his concern that the deeper underlying causes of digital threats are not sufficiently tackled. For example, the current design of the Internet contains leaks that should be sealed according to him. That is technically feasible, but the investments required are scarcely being made. Representatives from industry expressed the concern that it is particularly difficult to get SMEs involved, even though they jointly constitute 95% of Dutch industry; there is an awareness of digital security among them, but also a lack of concrete action. Finally, Theo Jochoms, adviser on science and education at the Dutch police, noted that a lot of attention is devoted to defending against cyber attacks but relatively little attention to detecting these.The fourth pillar, "Better understanding of attacks", studies vulnerabilities in designs, protocols, systems, defense measures, etc. Without an understanding of vulnerabilities, we cannot defend ourselves. The human factor will be given attention as well. Exposing the psychology of the attacker also makes it possible to improve the defense. Botnets could be knocked out before becoming active, for example. The fifth and final pillar, "Improved privacy", ties in with the fact that privacy is a fundamental right within the EU – one that is protected by law. And just like the efforts to achieve security by design, efforts should also be made to design ICT applications in which privacy is a priority from the outset: privacy by design. One of the points raised during the discussion round was that privacy is also a part of identity management: proving that somebody is who he or she claims to be. A second interesting discussion point, submitted by Professor of Cyber Security Governance at Leiden University, Bibi van den Berg, is that privacy should not only be examined in the narrow sense of the term at the level of the individual but also in the broader sense of a community or organisation. People are very keen to share certain things, whereas they do not wish to share other things at all or just with a few people. And ideas about privacy have also changed over the course of time, but this aspect has barely been studied to date.All comments and remarks made during the discussion afternoon will be carefully considered, concludes Jan Piet Barthel, director of dcypher (the Dutch Cybersecurity Platform Higher Education and Research), the organiser of the discussion afternoon. Proposals for amendments can still be submitted until 23 April. Where necessary, the draft texts of the NCSRA-III will be modified. On 5 June, the third edition of the National Cyber Security Research Agenda will be presented at press centre Nieuwspoort in The Hague.Text: Bennie Mols, sciencejournalistTranslation: NST SciencePhoto's: Thijs ter Hart


At KTH Royal Institute of Technology in Stockholm a Doctoral Student Position in Cyber Security is available.  Prof. Mathias Ekstedt contacted us since he had been struggling to find good candidates. https://www.kth.se/en/om/work-at-kth/lediga-jobb/what:job/jobID:203638/type:job/where:4/apply:1 KTH Royal Institute of TechnologyKTH Royal Institute of Technology in Stockholm has grown to become one of Europe’s leading technical and engineering universities, as well as a key centre of intellectual talent and innovation. We are Sweden’s largest technical research and learning institution and home to students, researchers and faculty from around the world. Our research and education covers a wide area including natural sciences and all branches of engineering, as well as in architecture, industrial management, urban planning, history and philosophy.The Department of Network and Systems Engineering, belonging to The School of Electrical Engineering and Computer Science, consists of around 30 faculty members, researchers and doctoral students who contribute to a high professional standard of intensive work and quality results, as well as to a friendly and open environment. The staff has a multicultural background and the working language is English. The department is internationally well established, has many research collaborations with excellent partners worldwide, and is involved in several European and national projects. Project descriptionThis project is aimed at contributing to the on-going research in the area of model-based assessment and prediction of cyber security in system architectures conducted by the Software Systems Architecture and Security group. To this end so called attack graphs are used. The attack graphs, that are automatically generated from models of corporate IT infrastructures, are subjected to probabilistic inference, producing estimates of the time to compromise different assets in the system architecture. Developing such attack graphs lies at the core of the research project.In particular this project will be focusing on information and control systems for smart power grids. Consequently the core of the project is to investigate and research components such as SCADA (Supervisory, Control And Data Acquisition) systems, PLCs (Programmable Logic Controllers), and RTUs (Remote Terminal Units) to identify potential attack vectors and defense mechanisms and to codify this in attack graphs for predicting cyber resilience of these components. The work will be conducted in close cooperation with several organizations in the Swedish power industry.The doctoral student will be enrolled in a doctoral student program offering a large amount of courses ensuring an in-depth development of relevant competences and skills.KTH offers an attractive working environment, generous remuneration, as well as other employment benefits. As a doctoral student at KTH you have many opportunities to participate at conferences, projects and other relevant events which will extend your professional network and benefit your future career. QualificationsThe successful applicant is expected to hold or be about to receive an MSc degree in computer science, software engineering, information systems, computer communication networks or similar. Specialization within IT security, statistics and machine learning, software modelling, and industrial control systems are particularly relevant.The successful applicant should have strong academic track record, and well developed analytical and problem solving skills. We are looking for a strongly motivated person, who is able to work independently but also together with other colleagues. Good command of English orally and in writing is required to publish and present results at international conferences and in international journals.
Lancering van de nieuwe onderzoeksagenda voor een veiligere samenleving op 5 juni tijdens een iPoort-sessie in Nieuwspoort.  Op 5 juni 2018 wordt de derde editie van de National Cyber Security Research Agenda (NCSRA-III) gepresenteerd tijdens een iPoort-sessie in Nieuwspoort in Den Haag. U kunt zich hier registeren.Programma 16:30 - 17:00    Ontvangst17:00 - 17:10    Welkom door Peter Zinn, middagvoorzitter17:10 - 17:15    Introductie NCSRA III door professor Michel van Eeten, hoogleraar Governance of cybersecurity TUD, namens de schrijvers van de agenda17:15 - 17:25    Overhandiging van de NCSRA-III, door Jan Piet Barthel, directeur dcypher, aan Patricia Zorko (J&V), Stan Gielen (NWO) en Henk-Jan Vink (TNO)17:25 - 17:40    Korte reactie op de ontvangst van de agenda door Patricia Zorko (namens de dcypher ondersteunende ministeries), Stan Gielen (namens NWO-domeinen die cyberveiligheidsonderzoek ondersteunen) en Henk-Jan Vink (namens TNO)17:40 - 18:25    Paneldiscussie geleid door Peter Zinn met:Marc Witteman, CEO RiscurePatricia Zorko, directeur Cyber Security, ministerie van Justitie en VeiligheidStan Gielen, voorzitter van de raad van bestuur van NWOKees Verhoeven, parlementslidHerbert Bos, hoogleraar Systems Security VU 18:25 - 18:30    Conclusies door Peter Zinn 18:30 -19:00    Drankje met een hapje 
The vacancy concerns an assistant professor position in Information Assurance and Security at the Johann Bernoulli Institute for Mathematics and Computer Science (JBI) of the Faculty of Science and Engineering (FSE). The JBI comprises five mathematics programmes and six computer science programmes. The research of the Computer Science department of the institute centers around fundamental computing, software engineering, information and distributed systems, visual computing, and intelligent systems, keeping a balanced mix of fundamental and applied aspects. The position will be embedded in the basic unit Information Systems. The institute participates in the FSE research theme Data Science and Systems Complexity (DSSC) and the new Center on Cognitive Systems and Materials (CogniGron).Job descriptionThe assistant professor is expected to develop an internationally leading research track record in Information assurance and security, leading to an autonomous research programme. Information assurance and security are concerned with ensuring, protecting and defending the security properties of data and information, namely availability, integrity, authenticity/trust, validity, and confidentiality. Topics of particular interest are: blockchain family of algorithms and approaches, and related access control mechanisms; approaches for secure data provisioning across all components of an IT system and beyond, and security-by-design; secure enterprise systems and architectures, and open systems for authentication and authorization; Innovative security patterns; novel biometrics techniques; information assurance and security in IoT, SOA, cloud computing, big data and business process management; information assurance and security aspects in the domains of smart cities, smart factories, smart energy, healthcare, supply chain management, data science.The research should lead to publications in high impact scientific journals and to contributions to major conferences in the field of expertise. Supervision of PhD students and postdocs is crucial. A strong involvement in the research theme Data Science and Systems Complexity or Cognitive Systems is expected. Interaction with application domains that require support in the area of information assurance and security is an important part of the research activities. The successful candidate is expected to contribute to the teaching within the Bachelor and Master programmes of Computer Science in the Undergraduate and Graduate Schools of Science of FSE. He/she will contribute both to teaching existing courses, and to the development of new courses in information assurance and security. The candidate is expected to have an active interest in and to provide a positive contribution to the management and organizational tasks of the institute. At the level of FSE, the candidate will contribute to the organization of the faculty, for example by participating in working groups and committees, in the fields of teaching, research and management. The candidate will participate in relevant national and international organizations.QualificationsYou have:• a PhD degree in the field of Computer Science or related discipline• a minimum of two years postdoctoral experience abroad, divided over no more than 2 episodes (industrial experience can partially compensate for this requirement)• excellent research qualities, as evidenced by a publication record in international peer-reviewed journals and renowned conferences, and a relevant international network• teaching and organizational experience appropriate to career stage• evidence of successful acquisition of external funding appropriate to career stage.You are:• a team player with good communications skills• willing to fulfill the requirements for the University Teaching Qualification• willing to learn the Dutch language.Conditions of employmentThe University of Groningen offers a gross monthly salary dependent on qualifications and work experience from €3,475 up to a maximum of €5,405 (salary scales 11 or 12 Dutch Universities) for a full-time position. The appointment will be initially for a maximum of 6 years at the level of tenure track assistant professor. After 5 years there will be an assessment of performance based on established criteria. If the outcome of the assessment is positive, the assistant professor will be promoted to associate professor with tenure. There will be another assessment at the end of a further 4-7 -year period for the promotion to full professor.In addition to the primary salary the University offers 8% holiday allowance and an end-of-year bonus of 8.3%.The University of Groningen provides career services for partners of new faculty members moving to Groningen.The University of Groningen has adopted an active policy to increase the number of female scientists across all disciplines of the university. Therefore, female candidates are especially encouraged to apply.ApplicationsYou may apply for this position until 31 May 23:59 h / before 1 June 2018 Dutch local time through the application form (click on ‘Apply’ below on this advertisement on the University website).Interested candidates are invited to submit a complete application including:• a letter of motivation (letter of motivation attachment)• a Curriculum Vitae, including a list of publications (CV attachment)• a list of five self-selected ‘best papers’ (extra attachment)• a statement about teaching goals and experience and a description of scientific interest and plans (extra attachment 2)• the names of three references complete with title and contact information (extra attachment 3). InformationFor information you can contact:Prof. J.B.T.M. Roerdink, Scientific director Johann Bernoulli Institute, +31 50 3633931, j.b.t.m.roerdink@rug.nlProf. D. Karastoyanova, Head Information Systems group, +31 50 3633229, d.karastoyanova@rug.nlPlease do not use the e-mail address(es) above for applications. Additional informationFull profile reportAdditional information about the research instituteCriteria and conditions of the Faculty’s Career Paths in Sciencehttps://www.rug.nl/about-us/work-with-us/job-opportunities/overview?details=00347-02S0006BGP&cat=wp.https://www.rug.nl/about-us/work-with-us/job-opportunities/overview?details=00347-02S0006BGP&cat=wp.
NWO-ENW opent op 23 april 2018 een nieuw ENW-breed PPS-fonds voor bottom-up publiek-privaat onderzoek binnen het NWO-domein Exacte en Natuurwetenschappen.Het ENW PPS-fonds biedt mogelijkheden voor samenwerking tussen (grotere) bedrijven, het MKB, kennisinstellingen, incl. het HBO, en met consortia van bedrijven en kennisinstellingen binnen de  topsectoren Chemie (incl. BBE), EnergieHightech Systemen & Materialen en ICT. Voorstellen dienen te passen in de kennis- en innovatieagenda’s van één of meer van deze topsectoren. Met het verschijnen van deze call blijven de huidige PPS-programma's - het Innovatiefonds Chemie van het voormalige NWO-Chemische Wetenschappen en het IPP van voormalig FOM - dit jaar de facto nog beschikbaar.Het ENW PPS-fonds stimuleert  bedrijven en kennisinstellingen om gezamenlijk tot innovaties en/of kennisopbouw te komen. Het Fonds financiert daartoe projecten waarin funderend onderzoek wordt uitgevoerd en heeft hiervoor in 2018 ca. 8,5 miljoen euro beschikbaar. Er kan worden ingediend tot 3 juli 2018. De beoogde besluitvorming is begin december 2018.Op 3 juli sluit het fonds, om later dit jaar plaats te maken voor een nieuw ENW-breed PPS-programma dat aansluit op het geharmoniseerde instrumentarium van NWO. Meer informatie hierover volgt later.Meer informatie over het ENW PPS-fonds is te vinden op de http://www.nwo.nl/enwppsfonds
Cybersecurity: het fundament onder economische en maatschappelijke kansen. De nieuwe Nederlandse Cybersecurity Agenda (NCSA) zet de noodzakelijke stap om onze digitale veiligheid te versterken en de vitale belangen van Nederland beter te beschermen. Nederland is een van de meest gedigitaliseerde landen ter wereld en heeft daardoor een uitstekende uitgangspositie. De economische en maatschappelijke kansen kunnen we alleen verzilveren als Nederland digitaal veilig is.De impact en snelheid waarmee technologie zich ontwikkelt vragen om een dynamische aanpak die aangepast kan worden aan veranderende dreigingen. Veel van de maatregelen vragen om een sterkere inzet van de overheid, andere kunnen alleen met of door marktpartijen worden ontwikkeld.“Cybersecurity is onlosmakelijk verbonden met onze nationale veiligheid en het ongestoord functioneren van onze maatschappij. Nu we zien dat de dreiging van cyberaanvallen toe blijft nemen, moet het basisniveau van beveiliging omhoog. Dat kunnen we als overheid niet alleen. De Nederlandse Cybersecurity Agenda kan alleen een succes worden als overheid en bedrijfsleven samen de schouders er onder zetten”, aldus minister van Justitie en Veiligheid Ferd Grapperhaus.Digitale slagkracht op ordeNederland moet beter voorbereid zijn op grootschalige cyberincidenten die de nationale veiligheid bedreigen. Cyberaanvallen treffen niet alleen de overheid maar juist ook het bedrijfsleven. Daarom moet er een landelijk dekkend stelsel komen waarbij informatie over de laatste cyberdreigingen en mogelijke maatregelen breder en effectiever worden gedeeld tussen publieke en private partijen. Zo versterken we de digitale slagkracht van overheid en bedrijfsleven.Stevigere samenwerking bedrijfslevenDe vitale processen in Nederland vragen extra bescherming en versneld herstel bij uitval of schade. Het is dan ook belangrijk dat in de vitale infrastructuur wordt gewerkt met vertrouwde cybersecuritybedrijven. Samen met het bedrijfsleven zal worden gewerkt aan de ontwikkeling van certificering zodat duidelijk is welke derde partijen betrouwbaar zijn.Ook doet Grapperhaus een beroep op grote bedrijven om kleinere bedrijven te helpen hun digitale veiligheid op orde te krijgen. Door het delen van informatie over de laatste dreigingen en maatregelen.“Een mooi voorbeeld daarvan is de samenwerking in de Rotterdamse haven. Onder het motto ‘je bent zo sterk als je zwakste schakel’, hebben zij de handen in een geslagen en een kennishub cybersecurity opgezet. Alle bedrijven in de haven delen informatie met elkaar zodat de Rotterdamse haven als geheel cyberaanvallen kan afslaan.”Investeren in opsporing en vervolgingDe versterking van cybersecurity en de aanpak van cybercrime kunnen niet los van elkaar gezien worden. Door fors te investeren in de digitale veiligheid van Nederland, houden we ook cybercriminelen buiten de deur. Het Openbaar Ministerie en de Politie krijgen meer capaciteit om cybercriminelen op te pakken en te vervolgen. Tegelijkertijd mag ook verwacht worden dat burgers zelf meer doen om hun digitale deur op slot te zetten. Daarom wordt geïnvesteerd in voorlichting zodat mensen bekend zijn met de grootste risico’s en belangrijkste maatregelen.Kabinetsbrede aanpakMet deze kabinetsbrede cybersecurity agenda geeft Grapperhaus als coördinerend minister invulling aan de opdracht uit het regeerakkoord te komen tot een integrale aanpak cybersecurity. De versterkte overheidsregie die voortvloeit uit de NCSA wordt belegd bij de NCTV, ook wordt het NCSC als nationaal expertisecentrum gepositioneerd.DocumentenKamerbrief over Nederlandse Cybersecurity Agenda (NCSA)Minister Grapperhaus (JenV) biedt de Nederlandse Cybersecurity Agenda (NCSA) aan de Tweede Kamer aan.Kamerstuk: Kamerbrief | 21-04-2018Nederlandse Cybersecurity Agenda: Nederland digitaal veiligRapport | 21-04-2018 https://www.rijksoverheid.nl/actueel/nieuws/2018/04/21/cybersecurity-het-fundament-onder-economische-en-maatschappelijke-kansen
Bekijk het volledige nieuwsoverzicht >