This website is an archive of the work of Marietje Schaake in the European Parliament between 2009 and 2019. Marietje can be reached at marietje.schaake@ep.europa.eu

Chatham House Cyber Conference 2016, Londen

Marietje
ch-logo Op 23 mei zal Marietje Schaake spreken tijdens de Chatham House Cyber Conferentie 2016. Deze conferentie omvat de extensieve rol van Chatham House’s internationale netwerk en haar kwaliteiten als een van 's werelds grootste onafhankelijke instituten op het gebied van internationale betrekkingen, om op die manier senior beleidsvormers, veiligheid experts, en leidende industrie figuren samen te brengen. Experts zullen praten over de belangrijke uitdagingen in cybersecurity en de ontwikkeling van nieuwe kansen en manieren om dreigingen het hoofd te bieden. Tijdens dit event zal Marietje Schaake de overlappen in wetgeving m.b.t. databeveiliging, privacy en overheidsveiligheid en hoe hier mee om te gaan ter discussie stellen. Agenda van het event: Session One | Continued Cyber Threats and Emerging Opportunities -What can be done to defend critical infrastructure, amid growing fears that it may be targeted by terrorists and others? Does the scope of ‘critical national infrastructure’ need to be revised in the cyber context to ensure preparedness and the correct government response? - As the ‘internet of things’ develops, how can cyber security be built in and how can it be ensured that cyber risks are managed without stifling innovation? - How can it be ensured that cyber security lessons already learned will be applied in the development of new products, including by technology companies first entering the market? -How can cyber resilience be ensured across the supply chain to ensure protection of, for example, intellectual property? Session Two | Data Protection, Privacy and National Security -How does legislation regarding data protection, privacy and government security overlap? What issues does this present and how can they be overcome? - What are the consequences for businesses, and the economy more broadly, of confusion or justified concerns over a lack of data privacy? What can be done to build consumer trust in cyberspace? - Should there be limits be on the right to data in the name of national security? - What are the consequences of recent terrorist attacks on governments’ approaches to the encryption debate? Are moves to limit its use crucial for national security or unnecessarily restrictive for technology companies and individuals? -How can the security services work more closely with human rights and privacy campaigners to limit personal intrusions while collecting crucial information? - What might be the consequences of the Data Retention and Regulatory Powers Act (DRIPA) legislation in the UK for privacy, national security and commercial organizations? Focused discussion – Comparing Global Policy Approaches to Data Collection, Privacy and Security - How do approaches to bulk data collection differ internationally and what lessons can be learned from the outcomes in terms of security, public trust in cyberspace and the effect on technology companies? Session Three | Tackling Cyber Crime: Policy, Skill Development and Collaboration -What can law enforcement and international organisations do to address the low cost of entry into cyber crime? How can criminal marketplaces be disrupted? - How does information sharing between businesses and across borders help to build resilience, what more can be done to improve collaboration and what is the role of regulators in facilitating this? - What impact will the Network and Information Security (NIS) directive have? Should there be EU level legislation mandating security requirements? - Does the potential for criminal cyber attacks pose a systemic risk to the financial sector? If so, to what extent do governments have a responsibility to protect businesses where a cybersecurity breach could have serious consequences for financial institutions and what policy mechanisms can be used to achieve this? - Is there a skills gap in cyber security and if so, what can be done to address it? Is there sufficient awareness of cyber security at the board level and motivation to take action in this area? - What is the best approach to quantifying reputational damage and how can incidents best be managed so as to limit it?