Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "NIS" wg kryterium: Temat


Wyświetlanie 1-1 z 1
Tytuł:
Changes Introduced by the NIS Directive 2.0 and their Potential Effect on Shaping the Cybersecurity Labour Market
Autorzy:
Porzeżyński, Marek
Kulicki, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/31341973.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
NIS 2
labour market
Opis:
Ensuring cybersecurity is – next to AI development – one of humanity’s greatest challenges nowadays. This is not a hyperbole – cybersecurity threats are real for public and private sectors, as well as individuals. With the rapid technological advancements and galloping digitisation, malicious entities and individuals are looking to take advantage of the online security gaps created by lack of caution. The European Union tried to counteract this by extensively discussing the issue, giving rise to the NIS directive. After a few years in force, its effects were assessed, and several changes were prepared to improve overall cybersecurity. However, these solutions will not work unless it becomes standard practice to employ cybersecurity specialists in a wide range of environments, extending far beyond those of the biggest organisations. This is what happened in the case of the General Data Protection Regulation (GDPR). The original provisions had been expanded to such an extent that they led to the emergence (separation) of an independent consultancy market in the field of information protection, with particular emphasis on personal data from the technical and legal consultancy markets. Hence, comparisons to the GDPR are valid. In this article, the authors review and assess the changes in cybersecurity legislation. This includes the NIS 2.0 directive category of digital service providers and their expected effects on the labour market.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 21-38
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-1 z 1

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies