Compliance, Ethics & Sustainability An international journal with a European focus 2025 nr. 3

Navigating a new era of reporting cyber incidents in the UK and EU

Kelly Hagedorn, Alice Portnoy and Hanna Hewitt1

Artikel kopen € 79,00 excl. BTW

In plaats van abonneren kunt u dit artikel ook afzonderlijk kopen.

Cyber security continues to be an issue that gathers mainstream attention, and for good reason. Both the costs of, and length of time to recover from, a cyber incident are increasing. According to IBM's 2024 'Cost of a Data Breach' report, the average cost of a data breach in 2024 has risen to $4.88 million.2 For some incidents (particularly those involving stolen or compromised credentials), the recovery period was recorded as being as long as 292 days. 

The increasing prevalence of cyber-attacks, and the disruption they can cause, has led to governments globally introducing new legislation and/or supplementing existing legislation to protect the most critical infrastructure, whilst also encouraging information sharing to enhance overall awareness of cyber risks. In several jurisdictions, cyber security requirements mandated by law are now being imposed on new industry sectors not traditionally seen as critical, a reflection of the changing way the world operates.

<...

U heeft op dit moment geen toegang tot de volledige inhoud van dit product. U kunt alleen de inleiding en hoofdstukindeling lezen.

Wanneer u volledige toegang wenst tot alle informatie kunt u zich abonneren of inloggen als abonnee.


Verder in dit artikel:

1. Reporting personal data breaches

1.1. Reporting obligations under the EU GDPR and UK GDPR

1.2. What is the position internationally?

2. Reporting cyber security incidents

2.1. Network and infomation Security directives

2.2. Digital Operational and Resilience Act

2.3. EU Cyber Resilience Act

3. What do organisations need to consider in light of the cyber security reporting requierements?

Deel deze pagina:

Nog niet beoordeeld

Bijlage(n)

  • Bijlagen zijn alleen beschikbaar voor abonnees.

Artikel informatie

Type
Artikel
Auteurs
Kelly Hagedorn, Alice Portnoy and Hanna Hewitt1
Auteursvermelding
Ik ben auteur van dit artikel
Datum artikel
Uniek Den Hollander publicatienummer
UDH:TvCo/18704

Verder in 2025 nr.3

 Public Data, Private Risks

How LLMs Might Reshape Compliance Investigations Since the explosion in use of generative AI tools in 2023, and more specifically, in the use of chatbots powered by Large Language Models ("LLMs"), ...

 Privacy vs. Whistleblowing: Can Data Breaches Be Justified During Public Disclosure?

Whistleblowing has recently been at the forefront of the public consciousness increasingly often. Wikileaks, Theranos, and Cambridge Analytics have become household names due to the efforts of inte...

 Europe’s Health Data Shift: Regulation, Anonymisation, and Security

The 2021 ransomware attack on Ireland's Health Service Executive[2], where attackers threatened to publish patient data, presaged a new era of healthcare vulnerability. As Europe implements ambitio...

 Uit de boekenkast van de bedrijfsethiek (94)

In de bedrijfsethiek is een groot aantal boeken en artikelen verschenen waarin op praktische wijze prangende vraagstukken worden behandeld en concrete aanbevelingen worden gedaan voor het bevordere...

 Editorial

Privacy, Data Protection and Cyber security will most likely be points, high on the agenda for most Risk Committee meetings. These are the themes for this, the third edition of the Compliance, Ethi...

 Apple Inc v Secretary of State for the Home Department: the latest iteration of the never-ending security versus privacy debate

The precise subject matter of the legal stand-off between international tech giant Apple and the UK Home Secretary, currently before the Investigatory Powers Tribunal (``IPT") in London, is unknown...

 Navigating a new era of reporting cyber incidents in the UK and EU

Cyber security continues to be an issue that gathers mainstream attention, and for good reason. Both the costs of, and length of time to recover from, a cyber incident are increasing. According to ...