Did you install the last updates yet?
Date: 05 Mar 2018

The Ministry of Justice and Security will launch a media campaign (radio and social media) in March to raise awareness among the general public about the importance of digital safety. The key message is to always promptly update the operating system on your computer, phone and tablet or of any application you use, as soon as an update becomes available. These updates often include security updates to patch known vulnerabilities. On the campaign website we explain how to do this and provide other tips to enhance your online safety.

The campaign website (see url) will contain a toolbox with all our campaign material which can be used by private partners who support (or intent to support) campaign.

Compliance with the NIS Directive via IEC 62443
Date: 10 Apr 2018

In May 2018, the Network & Information Security (NIS) Directive will be implemented into law in all EU member states. The directive is a pioneer initiative in the European Union and aims to increase the levels of cyber security across sectors deemed vital for the economy and for society in general. No doubt 2018 will be a challenging year for operators of critical infrastructures and services. On the brink of implementation, there are still uncertainties as to how compliance can be achieved, making this a pressing issue for asset owners, system integrators and product suppliers involved in industrial automation and control systems (IACS). If your business qualifies as an operator in the value chain of essential services, chances are compliance with the IEC 62443 series of standards is the way to go. On April 10, DEKRA and Applied Risk will show you how.

12.00 - 13.00 Welcome and registration
13.00 - 13.20 Introduction
13.20 - 14.20 Context and contents of the IEC 62443 standards (Auke Huistra, Applied Risk)
14.20 - 14.35 Coffee break and networking
14.35 - 15.45 Certification requirements (Beat Kreuter, DEKRA)
- Operational documents, administrative documents and additional considerations
- Assessment of supporting evidence or security capabilities applied to processes, products and solutions (and application thereof) by asset owners, service providers, and product suppliers
- Types of certificates
- Scope
- Assessment
- Types of evidence
- Functional areas & architecture
- Submittals
15.45 - 16.00 Q&A Session
16.00 - 18.00 Drinks & networking