Boundless Pages
Home
Risk Awareness
Cyber Security Risk Management
EU Cybersecurity Strategy
The Cybersecurity Strategy for the Digital Decade focuses on three key areas: enhancing resilience, fostering technological sovereignty, and establishing EU leadership in cybersecurity; strengthening operational capacity to prevent, deter, and respond to cyber threats; and promoting a globally open and secure cyberspace through cooperation. Key players include the European Network and Information Security Agency (ENISA), which leads EU cybersecurity standards; the Computer Emergency Response Team for EU institutions (CERT-EU), supporting EU-specific cybersecurity efforts; and member state security agencies, which work in tandem with EU bodies to implement cohesive, cross-border cybersecurity policies. These initiatives aim to secure a robust, unified, and resilient digital future across Europe.
EU cybersecurity legislation underpins cybersecurity by promoting security measures and regulating activities with potential cyber impacts. Key frameworks include the NIS 2 Directive for enhancing network and information system security, the Cyber Resilience Act to strengthen digital product security, the proposed Cyber Solidarity Act for coordinated response to cyber crises, the AI Act to ensure safe and ethical AI deployment, and the Digital Operational Resilience Act (DORA) to bolster resilience within the financial sector. Together, these laws aim to create a secure, resilient digital environment across the EU.
The US National Cybersecurity Strategy (2023) outlines a modernized approach to securing the nation's digital infrastructure, supported by implementation plans through 2024. This builds on the Comprehensive National Cybersecurity Initiative (CNCI) of 2009, the Executive Order on Improving the Nation’s Cybersecurity (2021), and the Department of Defense (DoD) Cyber Strategy (2018), with US Cyber Command leading military cyber operations. Together, these initiatives aim to enhance resilience, strengthen national defense, and protect critical infrastructure against evolving cyber threats.
The cybersecurity landscape is shaped by a range of legal frameworks across the EU, USA, and UK, alongside key regulatory standards. In the EU, prominent laws include the General Data Protection Regulation (GDPR), NIS 2 Directive, E-Privacy Directive, and Digital Operational Resilience Act (DORA), ensuring robust data protection and network security. The USA enforces cybersecurity through acts like the Homeland Security Act, Federal Information Security Management Act, HIPAA, and state laws such as California's CCPA/CPRA. In the UK, relevant laws include the UK GDPR, Data Protection Act 2018, NIS Regulations, and Computer Misuse Act 1990. On a regulatory level, frameworks like the Payment Card Industry Data Security Standard (PCI DSS), UK Gambling Commission, and NCSC Cyber Assessment Framework provide further guidelines for sector-specific security and compliance.
Introduction to Cybersecurity Risk
Drivers for Cybersecurity Management
Governance, Risk and Compliance
Benefits of Cyber Risk Management
Cybersecurity Strategy
EU Cyber Resilience Act
Digital Operational Resilience
DORA and IT Suppliers
ISO 27005 Risk Management
Technical and Business Impact
Risk Appetite
Security Risk Register
Cybersecurity Risk Assessment
Cybersecurity Vulnerability Risk Rating
Assessing Security Risks
Assessing Risk in Unsupported Systems
Cybersecurity Vulnerability Rating
Cybersecurity Threat Vectors
Cybersecurity Kill Chain
NCSC Cyber Assessment Framework
Plan-Do-Check-Act (PDCA) Cycle
Business Continuity Planning
Business Impact Analysis
Intrusion Detection System
Next-Generation Firewalls
More Next-Generation Firewalls
SIEM
Effective SIEM Management
Effective Incident Management
Roles and Responsibility Matrix
10 Steps of Cyber Security
10 Steps of Cyber Security P2
Vulnerability Management
Identity and Access Management
Cyber Security Risk-based Approach
Cyber Security Baseline Management
Cyber Resilience Framework
Supply Chain Risk Management
Supply Chain Risks
Incident Response
Incident Response Lessons Learned
Red Teams
Cybersecurity Training Videos
Cybersecurity Kill Chain
10 Steps to Cybersecurity
By Passing Microsoft 365 MFA