Trends in Security Information
The HSD Trendmonitor is designed to provide access to relevant content on various subjects in the safety and security domain, to identify relevant developments and to connect knowledge and organisations. The safety and security domain encompasses a vast number of subjects. Four relevant taxonomies (type of threat or opportunity, victim, source of threat and domain of application) have been constructed in order to visualize all of these subjects. The taxonomies and related category descriptions have been carefully composed according to other taxonomies, European and international standards and our own expertise.
In order to identify safety and security related trends, relevant reports and HSD news articles are continuously scanned, analysed and classified by hand according to the four taxonomies. This results in a wide array of observations, which we call ‘Trend Snippets’. Multiple Trend Snippets combined can provide insights into safety and security trends. The size of the circles shows the relative weight of the topic, the filters can be used to further select the most relevant content for you. If you have an addition, question or remark, drop us a line at info@securitydelta.nl.
visible on larger screens only
Please expand your browser window.
Or enjoy this interactive application on your desktop or laptop.
Governments tighten cyber regulations globally, emphasizing independent assurance and industry standards
The report focuses on the regulatory and policy approaches of Australia, Europe, Canada, United Kingdom, United States, and Singapore.
NCC Group is proud to be a close advisor to governments and legislators globally as they make important decisions about the
future of cyber rules. Utilizing our deep technical expertise, we help to shape new laws and policies. We do so with the aim of
creating a conducive operating environment and delivering on our purpose to create a more secure digital future.
Where we operate, whether that is in the UK, the Netherlands and across Europe, North America, Australia or Singapore, our
engagement with cybersecurity policymakers also affords us unique insights into the key regulatory and legislative changes
affecting us and our clients, and the commonalities and differences they need to navigate around the world.
Policy developments you need to know:
While politics may have delayed some reforms, cyber rules for critical infrastructure continue to be
tightened and more widely applied.
Governments told us not to pay ransomware gangs. But stopped short of an outright ban – for now.
With the cyber industry an increasingly critical pillar of the digitalized economy, governments are making
moves to assure the quality of services provided by practitioners and cyber firms. Australia has announced plans to co-design a code of practice for incident response providers, defining the service quality and professional standards that are expected from third-party cyber incident response providers.
Decoding governments’ big AI announcements
Governments don’t want AI developers to assure their own systems. Meanwhile, new G7 guidance emphasises that testing should include both “internal and independent external testing measures” as well as “a combination of methods such as red teaming.” Indeed, third party assurance of high-risk AI systems looks set to be required across most major economies’ domestic regulatory frameworks
There are positive signs of global cooperation on what is, ultimately, a global issue
There will be regulation. Governments globally have either announced or are developing plans to embed these safety and security principles in domestic regulation. That said, governments are taking different stances on the exact shape of these regulations and the timescales they are working to.
Three things to look out for in 2024
Elections = policy hiatus? With 40 countries going to the polls in 2024, electoral integrity in the face of emerging tech and nation-state cyber threats will be high on every cyber practitioner’s radar (as we explored in our 2024 outlook piece here). However, another development practitioners should be conscious of is the effect the elections are likely to have on cyber lawmaking.
Incident reporting mandates. Partially reflective across increased critical infrastructure regulation, incident reporting requirements are set to strengthen over the coming months.
New standards for hardware and software. All eyes will be on the EU’s Cyber Resilience Act (CRA) which, amidst some opposition by the security community, is set to be adopted shortly. The new law will introduce cybersecurity requirements for a significant proportion of hardware and software sold into the EU, covering risk assessments, vulnerability handling processes, and incident reporting. Once adopted, manufacturers and developers will have 36 months to adapt to the new requirements, with the exception of a more limited 21-month grace period in relation to the reporting obligations. This comes as the European Commission has adopted the implementing regulation for the (currently) voluntary Common Criteria-based cybersecurity certification scheme (EUCC).
Key considerations for organizations
- Increasing cyber regulation is the talk of the town. Don’t wait until the compliance deadline looms to take action.
- Boards are increasingly held accountable for cyber compliance. Make sure your executives have the information they need to make decisions about your cyber strategy.
- Know how to use policy insights and political horizon-scanning to inform sustainable cyber investments.
- Know the right questions to ask to ensure your decisions are future-proof in light of ever changing regulatory and political developments.
- Compliance doesn’t always equal good security. Know the difference.
- Gain a better understanding of the regulatory complexity and the decisions you can take to avoid fragmentation.