Cybersecurity in the financial sector and the quantum-safe cryptography transition: in search of a precautionary approach in the EU Digital Operational Resilience Act framework

Jančiūtė, L.
International Cybersecurity Law Review, vol. 6, pp: 145-154, 2025

Abstract

An ever more digitalised financial sector is exposed to a growing number of cyberattacks. Given the criticality and interconnectedness of this sector, cyber threats here represent not only operational risks, but also systemic risks. In the long run, the emerging cyber risks include developments in quantum computing threatening widely used encryption safeguarding digital networks. Globally in the financial sector, some initiatives have already been taking place to explore the possible mitigating measures. This paper argues that for an industry-wide transition to quantum-safe cryptography the precautionary principle is relevant. In the EU, financial entities now have to be compliant with the Digital Operational Resilience Act strengthening ICT security requirements. This research traces the obligation to adopt quantum-resistant precautionary measures under its framework.

Cybersecurity, quantum technologies

RIS

Save .RIS

Bibtex

Save .bib

The right to trust your vote: Cybersecurity, human rights and electronic voting download

van Daalen, O. & Hoekstra, N.
2024

Cybersecurity, Electronic voting, Human rights

RIS

Save .RIS

Bibtex

Save .bib

The New F-word: The case of fragmentation in Dutch cybersecurity governance external link

Mirzaei, P. & Busser, E. de
Computer Law & Security Review, vol. 55, num: 106032, 2024

Abstract

The fragmentation of the Dutch cybersecurity government landscape is a widely discussed phenomenon among politicians, policy makers, and cybersecurity specialists. Remarkably though, a negative narrative is underlying the idea of fragmentation, suggesting that we are dealing with a serious problem. A problem that has the potential of impeding cybersecurity governance in the Netherlands. This research zooms in on how cybersecurity governance is organised within the central government, and which organisations are concerned with the creation, implementation, and oversight of cybersecurity policies vis à vis Dutch society. This article provides an overview of all central government organisations (de Rijksoverheid) that are involved in cybersecurity governance on a strategic level. This research provides the first step in doctoral research into the possible implications of the fragmentation of cybersecurity governance in the Dutch central government, and how this fragmentation could potentially impact policy creation, implementation, and oversight. Based on the mapping of this governance landscape, it set out to measure fragmentation based on the number of units or organisations that are concerned with cybersecurity governance in the central government on a strategic level. This study has found that based on Boyne's (1992) notion of fragmentation and the Dutch governments’ definition of tiers, the Dutch cybersecurity governance landscape could indeed, when meticulously following Boyne's counting procedure, be regarded as fragmented.

Cybersecurity, fragmentation, Internet governance, the netherlands

RIS

Save .RIS

Bibtex

Save .bib

In China’s cyberwereld is niet vrijheid, maar gehoorzaamheid de norm external link

Het Financieele Dagblad, vol. 2018, 2018

China, Cybersecurity, Informatierecht

RIS

Save .RIS

Bibtex

Save .bib

Geen Spelen of verkiezingen zonder digitale oorlogsvoering external link

Het Financieele Dagblad, vol. 2018, 2018

China, Cybersecurity, ddos, digitale oorlogsvoering, hacking, informatierect, Surveillance

RIS

Save .RIS

Bibtex

Save .bib

Ziekenhuizen en energiebedrijven gaan wellicht boeten voor beveiligingsfouten: Nieuwe IT-wet bedoeld om ‘potentiële maatschappelijke ontwrichting’ te voorkomen external link

Het Financieele Dagblad, vol. 2017, 2017

beveiliging, Cybersecurity, energiebedrijven, it, nederland, Privacy, ransomware, Telecommunicatierecht, toezicht, wetgeving, ziekenhuizen

RIS

Save .RIS

Bibtex

Save .bib

China’s new cybersecurity law – effective as of 1 June 2017 external link

Staden ten Brink, R. van, Wang, J., Veldhoen, D. & Arnbak, A.
Trade Security Journal, vol. 2017, num: 2, pp: 27-29, 2017

Abstract

While China’s new cybersecurity law may appear vague, cumbersome and lacking clarity, one thing is clear and that is that international companies with any operations and/or activities in China should quickly assess if and how they are covered by the new legislation.

China, Cybersecurity

RIS

Save .RIS

Bibtex

Save .bib

Wat eeuwen van spam ons leren over cybersecurity external link

2015

Bescherming van communicatie, Cybersecurity, Grondrechten, spam

RIS

Save .RIS

Bibtex

Save .bib

Deltaplan voor online privacy & beveiliging external link

Het Financieele Dagblad, 2014

Cybersecurity, data retention, ECHR, Grondrechten, hacking, NSA, Privacy, Surveillance, wiretapping

RIS

Save .RIS

Bibtex

Save .bib

Any Colour You Like: the History (and Future?) of E.U. Communications Security Policy external link

2014

Abstract

This descriptive legal analysis maps and evaluates a four decade legacy of communications security conceptualizations in E.U. law and policy, including four legislative proposals launched in 2013. As the first comprehensive historical analysis of its kind, the paper forwards a range of new scientific contributions in a time secure electronic communications are of historically unparalleled societal, economic and political relevance. Five communications security policy cycles are identified, and their ‘security’ definitions and scope are described. These cycles are: network and information security, data protection, telecommunications, encryption and cybercrime. An evaluation of the current E.U. ‘security’ conceptualizations illuminates the underlying values at stake, the protection offered in current regulations, the formulation of six research themes and an agenda for computer science, political theory and legal research. Despite constitutional values at stake such as privacy and communications freedom and a robust computer science literature, the paper observes a deep lack of conceptual clarity and coherence in E.U. security policymaking. It then concludes that the observed conceptual ambiguity has allowed powerful stakeholders to capture, or paint E.U. network and information security policies in any colour they like.

Constitutional and administrative law, Cybersecurity, Data protection, encryption, EU law, network and information security, securitization, Technologie en recht, the c.i.a.-triad

RIS

Save .RIS

Bibtex

Save .bib