BETA

Subject "3.30.07 Cybersecurity, cyberspace policy"

Dossiers (60)

Union Rolling Work Programme for European cybersecurity certification
Monitoring and Evaluation Framework for the Digital Europe Programme
EU Policy on Cyber Defence
Implementation of the EU's Cybersecurity Strategy for the Digital Decade. Report
Towards a more resilient, competitive and sustainable Europe
Blueprint to coordinate a Union-level response to disruptions of critical infrastructure with significant cross-border relevance. Proposal for a Council Recommendation
Closing the cybersecurity talent gap to boost the EU’s competitiveness, growth and resilience ('The Cybersecurity Skills Academy')
EEA Agreement: amending Protocol 31 on cooperation in specific fields outside the four freedoms (Cybersecurity Centre). EU position
EEA Agreement: amending Annex XI (Electronic communication, audiovisual services and information society) and Protocol 37 (containing the list provided for in Article 101) (Cybersecurity Act). EU position
Coordinated approach by the Union to strengthen the resilience of critical infrastructure. Proposal for a Council Recommendation
Authorising the negotiations for a comprehensive international convention on countering the use of information and communications technologies for criminal purposes. Recommendation for a Council decision
EEA Agreement: amending Protocol 31 on cooperation in specific fields outside the four freedoms (Digital Europe Programme). EU position
Secure 5G deployment in the EU - Implementing the EU toolbox
Coordinated implementation roadmap for the transition to post-quantum cryptography. Commission Recommendation
European citizens' initiative: 'Stop (((5G))) - Stay Connected but Protected'. Commission Implementing Decision
List of proposals selected for funding and proposals placed on the reserve list under the European Defence Industrial Development Programme following the calls for proposals EDIDP-MUGS-2019, EDIDP-ISR-2019, EDIDP-CSAMN-2019, EDIDP-PNTSCC-2019, EDIDP-NGPSC-2019, EDIDP-ACC-2019, EDIDP-FNPRT-2019 and EDIDP-SME-2019 launched under the work programme for the years 2019 and 2020 adopted by the Decision C(2019)2205. Commission Implementing Decision
List of proposals selected for funding under the European Defence Industrial Development Programme following the call for proposals EDIDP-ESC2S – European Command and Control (C2) system from strategic to tactical level launched under the work programme for the years 2019 and 2020 adopted by the Decision C(2019)2205. Commission Implementing Decision
Recent revelations of spying on Members of the European Parliament and the lack of follow up on the PEGA committee recommendations
Resolution on the lack of legislative follow-up by the Commission to the PEGA resolution
Urgent need for a coordinated European response and legislative framework on intrusive spyware, based on the PEGA enquiry committee recommendations
Establishing a list of essential services
Adoption of the Cyber package proposals
Lack of actions taken by the Commission in the context of the duty of sincere and loyal cooperation
Lack of actions taken by the Commission in the context of the duty of sincere and loyal cooperation
Recommendation to the Council and the Commission following the investigation of alleged contraventions and maladministration in the application of Union law in relation to the use of Pegasus and equivalent surveillance spyware
Measures to strengthen solidarity and capacities in the Union to detect, prepare for and respond to cybersecurity threats and incidents
Managed security services
Proposal to seek an opinion from the Court of Justice on the Second Additional Protocol to the Cybercrime Convention
Surveillance and predator spyware systems in Greece
Use of the Pegasus Software by EU Member States against individuals including MEPs and the violation of fundamental rights
EU preparedness to cyber-attack following Russia invasion on Ukraine
Decision on setting up a committee of inquiry to investigate the use of the Pegasus and equivalent surveillance spyware, and defining the subject of the inquiry, as well as the responsibilities, numerical strength and term of office of the committee
The surveillance of politicians, prosecutors, and lawyers, and other persons and entities in EU member states using cyber surveillance software
Investigation of alleged contraventions and maladministration in the application of Union law in relation to the use of Pegasus and equivalent surveillance spyware
Cyber Resilience Act
High common level of cybersecurity at the institutions, bodies, offices and agencies of the Union
Information security in the institutions, bodies, offices and agencies of the Union
The Pegasus spyware scandal
Recent Cyberattacks on EU institutions and on sensitive national public and private institutions
Resolution on the EU’s Cybersecurity Strategy for the Digital Decade
Convention on Cybercrime on enhanced co-operation and disclosure of electronic evidence: Second Additional Protocol
State of EU cyber defence capabilities
Resilience of critical entities
A high common level of cybersecurity
Security threats connected with the rising Chinese technological presence in the EU and possible action on the EU level to reduce them
International cooperation in the fight against cybercrime - the threat to public services
Cyber defence
European Cybersecurity Competence Centre
European Defence Fund 2021–2027
Digital Europe programme 2021–2027
Fight against cybercrime
EU Cybersecurity Agency (ENISA) and information and communication technology cybersecurity certification (Cybersecurity Act)
European defence industrial development programme
Cyber-attacks against the media - new level of threat to cybersecurity
Resolution on a cybersecurity strategy of the European Union: an open, safe and secure cyberspace
High common level of network and information security across the Union. NIS Directive
Cyber security and defence
Critical information infrastructure protection. Achievements and next steps: towards global cyber-security
European Network and Information Security Agency (ENISA): further development
Judicial cooperation in criminal matters: combating attacks against information systems