MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
Journal Article

Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive

2023
Request Book From Autostore and Choose the Collection Method
Overview
The NIS Directive and sector-specific cybersecurity regulations require the reporting of (security) incidents to supervisory authorities. Following the risk-based approach adopted in the NIS Directive, the NIS 2 Directive enlists as a basic security element the reporting of significant incidents that (i) have caused or (ii) are capable to cause harm, as well as (iii) notifying the service recipients of cyber threats. Although during the interinstitutional negotiations between the European Commission, the European Parliament, and the Council of the European there was consensus that the NIS Directive’s reporting framework needs to be reformed, views on the determination of what needs to be reported varied. This paper outlines and analyses the different concepts of a report-worthy significant incident that have been proposed during the legislative procedure for the NIS 2 Directive from a legal and policy perspective. Irrespective of further motives that may inhibit reporting, legal compliance is difficult to achieve where legal requirements are vague. In that regard, the difficulties to determine the reporting thresholds in the past and in the future are addressed. In consideration of the increased attack surface and threat scenario, it is argued that incidents where no harm has materialized should not be treated any different than incidents that have actually resulted in harm in order to acquire the envisaged full picture of the threat landscape and create value for business and society.
Publisher
Oxford University Press
Subject

MBRLCatalogueRelatedBooks