CINXE.COM
The EU Cyber Diplomacy Toolbox: An In-Depth Analysis of Cyber Diplomacy
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>The EU Cyber Diplomacy Toolbox: An In-Depth Analysis of Cyber Diplomacy</title> <meta name="description" content="Explore the EU Cyber Diplomacy Toolbox, an essential framework for addressing cyber threats through international cooperation and diplomatic measures. Enabling coordinated actions, sanctions, restrictive measures. "> <meta name="keywords" content="EU Cyber Diplomacy Toolbox, Diplomacy Toolbox, cyber diplomacy, EU cyber policies, international cybersecurity, cyber threat response, cybersecurity diplomacy, global cyber cooperation, Global Cybersecurity Cooperation"> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Index", "item": "https://www.cyber-diplomacy-toolbox.com" }, { "@type": "ListItem", "position": 2, "name": "Revised Implementing Guidelines, Cyber Diplomacy Toolbox", "item": "https://www.cyber-diplomacy-toolbox.com/Revised_Implementing_Guidelines_Cyber_Diplomacy_Toolbox.html" }, { "@type": "ListItem", "position": 3, "name": "Cyber Diplomacy", "item": "https://www.cyber-diplomacy-toolbox.com/Cyber_Diplomacy.html" }, { "@type": "ListItem", "position": 4, "name": "Cyber Diplomacy Links", "item": "https://www.cyber-diplomacy-toolbox.com/Cyber_Diplomacy_Links.html" }, { "@type": "ListItem", "position": 5, "name": " Impressum", "item": "https://www.cyber-risk-gmbh.com/Impressum.html" } ] } </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Organization", "name": "Cyber Risk GmbH", "url": "https://www.cyber-risk-gmbh.com", "logo": "https://www.cyber-risk-gmbh.com/Cyber_Risk_GmbH_Logo.jpg", "sameAs": [ "https://www.linkedin.com/company/71474270/admin/page-posts/published/", "https://x.com/Cyber_Risk_GmbH" ], "contactPoint": { "@type": "ContactPoint", "telephone": "+41-79-5058960", "contactType": "Customer Service", "areaServed": "Worldwide", "availableLanguage": "English" }, "founder": { "@type": "Person", "name": "George Lekatis" }, "description": "Cyber Risk GmbH is a leading provider of cyber risk and compliance training in Switzerland and worldwide.", "address": { "@type": "PostalAddress", "streetAddress": "Dammstrasse 16", "addressLocality": "Horgen", "addressRegion": "Canton of Zürich", "postalCode": "8810", "addressCountry": "CH" } } </script> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> <meta name="google-site-verification" content="I0CDxLn5hun_Esd7Gf8jIPUBQ1eIIcVNsUQQ9d4Dq8Q"> <style> .wrapper-banner { background: url("Diplomacy_4.jpg"); background-size: cover; background-position: center; } </style> <link rel="stylesheet" href="./style2.css"> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.cyber-diplomacy-toolbox.com" target="_blank" >Index</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/Revised_Implementing_Guidelines_Cyber_Diplomacy_Toolbox.html" target="_blank" >Revised Guidelines (2023)</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/Diplomacy.html" target="_blank" >Diplomacy</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/Cyber_Diplomacy.html" target="_blank" >Cyber Diplomacy</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/Council_Regulation_2019_796.html" target="_blank" >Council Regulation 2019/796</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/Council_Decision_2019_797.html" target="_blank" >Council Decision 2019/797</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/EU_Cybersecurity_Strategy_for_the_Digital_Decade.html" target="_blank" >EU Cybersecurity Strategy</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/Cyber_Diplomacy_USA.html" target="_blank" >Cyber Diplomacy in the USA</a></li> <li><a href="https://www.cyber-diplomacy-toolbox.com/Cyber_Diplomacy_Links.html" target="_blank" >Cyber Diplomacy Links</a></li> <li><a href="https://www.cyber-risk-gmbh.com" target="_blank">Cyber Risk GmbH</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a> </li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h1>The Cyber Diplomacy Toolbox</h1> <br> <p class="text-left"><b>What is the EU Cyber Diplomacy Toolbox?</b></p> <p class="text-left">The EU Cyber Diplomacy Toolbox is a joint EU diplomatic response to malicious cyber activities. This is part of the EU's approach to cyber diplomacy within the Common Foreign and Security Policy, and it contributes to conflict prevention, the mitigation of cybersecurity threats, and greater stability in international relations. It influences the behaviour of potential aggressors.</p> <p class="text-left">The EU diplomatic response to malicious cyber activities is proportionate to the scope, scale, duration, intensity, complexity, sophistication and impact of each cyber activity. All diplomatic efforts promote security and stability in cyberspace through increased international cooperation, and reduce the risk of misperception, escalation and conflict that may stem from ICT incidents.</p> <br> <p class="text-left"><b>Understanding the Cyber Diplomacy Toolbox.</b></p> <p class="text-left">On 14 March 2017, the European External Action Service (EEAS) and the European Commission presented a paper on a joint EU diplomatic response to cyber operations. </p> <p class="text-left">The paper was examined by the <b>Horizontal Working Party on Cyber Issues, </b>established in 2016, responsible for coordination of Council's work on cyber issues (mainly the cyber policy and legislative activities).</p> <p class="text-left">The main objectives of the Horizontal Working Party on Cyber Issues are:</p> <p class="text-left">- ensuring a horizontal working platform providing for harmonisation and unified approach on cyber policy issues,</p> <p class="text-left">- coherent progress in the cyber domain, while keeping up with cyber threats,</p> <p class="text-left">- identify and expand cooperation with Council preparatory bodies and other relevant actors,</p> <p class="text-left">- information-sharing on cyber issues both among EU countries and national bodies,</p> <p class="text-left">- setting EU cyber priorities and strategic objectives as part of a comprehensive policy framework,</p> <p class="text-left">- representation of the EU in accordance with the strategic EU cyber policy objectives.</p> <p class="text-left">The paper was sent to the Horizontal Working Party on Cyber Issues from the <b>Political and Security Committee (PSC),</b> responsible for the EU's Common Foreign and Security Policy (CSFP) and the Common Security and Defence Policy (CSDP). </p> <p class="text-left">The Political and Security Committee (PSC):</p> <p class="text-left">- monitors the international situation</p> <p class="text-left">- recommends strategic approaches and policy options to the Council</p> <p class="text-left">- provides guidance to the Military Committee, the Politico-Military Group and the Committee for Civilian Aspects of Crisis Management</p> <p class="text-left">- ensures political control and strategic direction of crisis management operations.</p> <p class="text-left">The PSC is composed of member states' ambassadors based in Brussels, and is chaired by the representatives from the European External Action Service. It meets twice a week, or more often if necessary.</p> <p class="text-left">On 6 June 2017, the final text of the draft Council Conclusions was submitted to PSC with several additions, with a view to their adoption by the Council. On 19 June 2017, the Council of the European Union <b>adopted the draft Council Conclusions on a Framework for a Joint EU Diplomatic Response to Malicious Cyber Activities ("Cyber Diplomacy Toolbox").</b> </p> <p class="text-left">The toolbox includes diplomatic "restrictive" measures within the EU Common Foreign and Security Policy that can be used against malicious operations directed against member states in cyberspace. The response must ne proportionate to the scope, scale, duration, intensity, complexity, sophistication and impact of the cyber activity. </p> <p class="text-left">According to the toolbox, it is very important for EU member states to unify their diplomatic response against malicious cyber activities, to strengthen the security of European countries. </p> <br> <p class="text-left"><b>What has happened after the adoption of the Cyber Diplomacy Toolbox?</b></p> <p class="text-left">On 17 May 2019, the Council of the European Union adopted:</p> <p class="text-left"> - <a href="https://www.cyber-diplomacy-toolbox.com/Council_Decision_2019_797.html" target="_blank">Council Decision (CFSP) 2019/797</a>, and </p> <p class="text-left"> - <a href="https://www.cyber-diplomacy-toolbox.com/Council_Regulation_2019_796.html" target="_blank">Council Regulation (EU) 2019/796</a>.</p> <p class="text-left">The Decision and the Regulation cover substantial elements of the EU Cyber Diplomacy Toolbox, and measures against cyber attacks threatening the European Union, or its Member States. </p> <br> <p class="text-left">On 16 December 2020, the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy presented a new EU Cybersecurity Strategy. </p> <p class="text-left">The new EU Cybersecurity Strategy is a key component of Shaping Europe's Digital Future, the Recovery Plan for Europe, and the EU Security Union Strategy. It will bolster Europe's collective resilience against cyber threats and help to ensure that all citizens and businesses can fully benefit from trustworthy and reliable services and digital tools. Whether it is the connected devices, the electricity grid, or the banks, planes, public administrations and hospitals Europeans use or frequent, they deserve to do so with the assurance that they will be shielded from cyber threats.</p> <p class="text-left">The new Cybersecurity Strategy also allows the EU to step up leadership on international norms and standards in cyberspace, and to strengthen cooperation with partners around the world to promote a global, open, stable and secure cyberspace, grounded in the rule of law, human rights, fundamental freedoms and democratic values. </p> <p class="text-left">You may visit:</p> <p class="text-left"><a href="https://www.cyber-diplomacy-toolbox.com/EU_Cybersecurity_Strategy_for_the_Digital_Decade.html" target="_blank">The EU’s Cybersecurity Strategy for the Digital Decade:</a> </p> <br> <p class="text-left"><b>What has happened after the EU’s Cybersecurity Strategy for the Digital Decade?</b></p> <p class="text-left"><a href="https://www.nis-2-directive.com" target="_blank">The NIS 2 Directive</a></p> <p class="text-left"><a href="https://www.european-cyber-resilience-act.com" target="_blank">The European Cyber Resilience Act</a></p> <p class="text-left"><a href="https://www.digital-operational-resilience-act.com" target="_blank">The Digital Operational Resilience Act</a></p> <p class="text-left"><a href="https://www.european-cyber-defence-policy.com" target="_blank">The European Cyber Defence Policy</a></p> <p class="text-left"><a href="https://www.strategic-compass-european-union.com" target="_blank">The Strategic Compass of the European Union</a></p> <p class="text-left"><a href="https://www.european-chips-act.com" target="_blank">The European Chips Act </a></p> <hr> <p class="text-left"><b>The June 2017 Draft Council Conclusions on a Framework for a Joint EU Diplomatic Response to Malicious Cyber Activities ("Cyber Diplomacy Toolbox"). The Council of the European Union adopted the following conclusions:</b></p> <br> <p class="text-left">1. The EU recognises that cyberspace offers significant opportunities, but also poses continuously evolving challenges for EU external policies, including for the Common Foreign and Security Policy, and affirms the growing need to protect the integrity and security of the EU, its Member States and their citizens against cyber threats and malicious cyber activities.</p> <p class="text-left">The EU recalls its conclusions on the EU Cybersecurity strategy, in particular its determination to keep cyberspace open, free, stable and secure where fundamental rights and the rule of law fully apply. It also recalls its Conclusions on Cyber Diplomacy, in particular that a common and comprehensive EU approach for cyber diplomacy could contribute to conflict prevention, the mitigation of cybersecurity threats and greater stability in international relations.</p> <p class="text-left">The EU and its Member States note the importance of the ongoing EU cyber diplomacy engagement and of the need for coherence among the EU cyber initiatives to effectively strengthen the cyber resilience, and are encouraged to further intensify their efforts on cyber dialogues within the framework of effective policy coordination, and emphasise the importance of cyber capacity building in third countries.</p> <br> <p class="text-left">2. The EU is concerned by the increased ability and willingness of State and non-state actors to pursue their objectives by undertaking malicious cyber activities of varying in scope, scale, duration, intensity, complexity, sophistication and impact.</p> <p class="text-left">The EU affirms that malicious cyber activities might constitute wrongful acts under international law and emphasises that States should not conduct or knowingly support ICT activities contrary to their obligations under international law, and should not knowingly allow their territory to be used for internationally wrongful acts using ICTs, as it is stated in the 2015 report of the United Nations Groups of Governmental Experts (UN GGE).</p> <br> <p class="text-left">3. The EU recalls its and its Member States' efforts to improve cyber resilience in particular through the implementation of the NIS Directive and the operational cooperation mechanisms provided therein, and that malicious cyber activities against information systems, as defined under EU law, constitute a criminal offence and that effective investigation and prosecution of such crimes remains a common endeavour for Member States.</p> <p class="text-left">The EU and its Member States take note of the ongoing work of the United Nations Groups of Governmental Experts on Developments (UN GGE) in the Field of Information and Telecommunications in the context of international security, building on the 2010, 2013 and 2015 reports, and are encouraged to strongly uphold the consensus that existing international law is applicable to cyberspace. </p> <p class="text-left">The EU and its Member States have a strong commitment to actively support the development of voluntary, non-binding norms of responsible State behaviour in cyberspace and the regional confidence building measures agreed by the OSCE6 to reduce the risk of conflicts stemming from the use of information and communication technologies.</p> <p class="text-left">The EU reaffirms its commitment to the settlement of international disputes in cyberspace by peaceful means, and that all of the EU’s diplomatic efforts should as a priority be aimed at promoting security and stability in the cyberspace through increased international cooperation, and at reducing the risk of misperception, escalation and conflict that may stem from ICT incidents. In that regard the EU recalls the UN General Assembly call to the UN Member States to be guided by the UNGGE reports' recommendations in their use of ICTs.</p> <br> <p class="text-left">4. The EU stresses that clearly signaling the likely consequences of a joint EU diplomatic response to such malicious cyber activities influences the behavior of potential aggressors in cyberspace thus reinforcing the security of the EU and its Member States. </p> <p class="text-left">The EU reminds that attribution to a State or a non-State actor remains a sovereign political decision based on all-source intelligence and should be established in accordance with international law of State responsibility. In that regard, the EU stresses that not all measures of a joint EU diplomatic response to malicious cyber activities require attribution to a State or a non-State actor.</p> <br> <p class="text-left">5. The EU affirms that measures within the Common Foreign and Security Policy, including, if necessary, restrictive measures, adopted under the relevant provisions of the Treaties, are suitable for a Framework for a joint EU diplomatic response to malicious cyber activities and should encourage cooperation, facilitate mitigation of immediate and long-term threats, and influence the behavior of potential aggressors in a long term. The EU will work on the further development of a Framework for a joint EU diplomatic response to malicious cyber activities, guided by the following main principles:</p> <p class="text-left">• serve to protect the integrity and security of the EU, its Member States and their citizens,</p> <p class="text-left">• take into account the broader context of the EU external relations with the State concerned,</p> <p class="text-left">• provide for the attainment of the CFSP objectives as set out in the Treaty on the European Union (TEU) and the respective procedures provided for their attainment,</p> <p class="text-left">• be based on a shared situational awareness agreed among the Member States and correspond to the needs of the concrete situation in hand,</p> <p class="text-left">• be proportionate to the scope, scale, duration, intensity, complexity, sophistication and impact of the cyber activity,</p> <p class="text-left">• respect applicable international law and must not violate fundamental rights and freedoms.</p> <br> <p class="text-left">6. The EU calls on the Member States, the European External Action Service (EEAS) and the Commission to give full effect to the development of a Framework for a joint EU diplomatic response to malicious cyber activities and reaffirms in this regard its commitment to continue the work on that Framework in cooperation with the Commission, EEAS and other relevant parties by putting in place implementing guidelines, including preparatory practices and communication procedures and to test them through appropriate exercises. </p> <br> <hr> <p class="text-left"><b>Council Conclusions on Cyber Diplomacy, 11 February 2015.</b></p> <p class="text-left">The Council of the European Union,</p> <p class="text-left">RECOGNISING that cyberspace issues, in particular cyber security, the promotion and protection of human rights in cyberspace, the application of existing international law, rule of law and norms of behaviour in cyberspace, Internet governance, the digital economy, cyber capacity building and development, and strategic cyber relations offer significant opportunities, but also pose continuously evolving challenges for EU external policies, including the Common Foreign and Security Policy,</p> <p class="text-left">AFFIRMING that the EU and its Member States should address these cross-cutting multifaceted issues with a coherent international cyberspace policy that promotes EU political, economic and strategic interests and continue to engage with key international partners and organisations as well as with civil society and the private sector,</p> <p class="text-left">UNDERLINING that such policy should build on existing policy documents, in particular the Council Conclusions on the Digital Agenda for Europe, on the first anniversary of the EU Strategic Framework and Action Plan on Human Rights and Democracy, on the EU Cyber Security Strategy, and on Internet governance,</p> <p class="text-left">BEARING IN MIND the recent terrorist attacks in France and AFFIRMING the need for a comprehensive approach in the fight against terrorism that includes various actions in different policies, including in the area of transport, finance, information technologies and in relations with third countries, as stipulated in the joint statement of the Justice and Home Affairs Ministers at their informal meeting held in Riga on 29 and 30 January 2015,</p> <p class="text-left">REAFFIRMING the EU’s position that the same norms, principles and values that the EU upholds offline, notably the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, the European Convention for the Protection of Human Rights and Fundamental Freedoms, the Convention on the Rights of the Child and the EU Charter of Fundamental Rights, should also apply and receive protection in cyberspace,</p> <p class="text-left">RECALLING the crucial importance of promoting and protecting a single, open, free and secure cyberspace which fully reflects and respects the core EU values of democracy, human rights and the rule of law,</p> <p class="text-left">EMPHASISING the importance of trust through enhanced availability, security, reliability and interoperability of online communications and noting that the secure flow and handling of data is contributing to economic growth,</p> <p class="text-left">CONSIDERING that the growing number of international fora, bilateral and multilateral meetings and processes on cyberspace issues poses challenges to all stakeholders in ensuring appropriate participation,</p> <p class="text-left">ACKNOWLEDGING that developing an overarching and coherent narrative on EU cyber issues is crucial in the face of expanding and complex international discussions,</p> <p class="text-left">HEREBY</p> <p class="text-left">REGARDS as essential and crucial the further development and implementation of a common and comprehensive EU approach for cyber diplomacy at global level that:</p> <p class="text-left">• promotes and protects human rights and is grounded on the fundamental EU values of democracy, human rights and the rule of law, including the right to freedom of expression; access to information and right to privacy,</p> <p class="text-left">• ensures that the Internet is not abused to fuel hatred and violence and safeguards that the Internet remains, in scrupulous observance of fundamental freedoms, a forum for free expression in full respect of law,</p> <p class="text-left">• promotes a cyber policy informed by gender equality,</p> <p class="text-left">• advances European growth, prosperity and competitiveness and protects EU core values, inter alia, by strengthening cybersecurity and improving cooperation in fighting cybercrime,</p> <p class="text-left">• contributes to mitigation of cybersecurity threats, conflict prevention and greater stability in international relations through the use of diplomatic and legal instruments,</p> <p class="text-left">• promotes the efforts to strengthen the multi-stakeholder model of Internet governance,</p> <p class="text-left">• fosters open and prosperous societies through cyber capacity building measures in third countries that enhances the promotion and protection of the right to freedom of expression and access to information and that enables citizens to fully enjoy the social, cultural and economic benefits of cyberspace, including by promoting more secure digital infrastructures,</p> <p class="text-left">• promotes the sharing of responsibilities among relevant stakeholders, including through cooperation between the public and private sectors as well as research and academic institutions on cyber issues,</p> <p class="text-left">NOTES that these Council Conclusions are without prejudice to the distribution of competences between the EU and its Member States and the allocation of powers between the EU institutions, AND</p> <p class="text-left">INVITES the EU and its Member States to work together, respecting each other's areas of competence and the principle of subsidiarity, in response to the strategic objectives set out in these Conclusions.</p> <br> <p class="text-left"><b>Promotion and Protection of Human Rights in Cyberspace</b></p> <p class="text-left">UNDERLINES that individuals' human rights and fundamental freedoms as enshrined in the relevant international instruments must be respected and upheld equally online and offline and WELCOMES the fact that this principle has been also affirmed by the UN Human Rights Council5 and General Assembly,</p> <p class="text-left">CALLS UPON the EU and its Member States:</p> <p class="text-left">• to promote and protect human rights and fundamental freedoms in cyberspace, including freedom of expression, access to information, assembly and association, privacy, effective remedy and a fair trial and to strongly uphold and firmly defend their common positions in the relevant regional and global fora,</p> <p class="text-left">• to actively contribute to the enforcement of international human rights obligations in cyberspace,</p> <p class="text-left">• to protect human rights of victims of serious and organised crime in cyberspace by promoting effective investigations and prosecutions, allowing competent authorities to gain timely access to electronic evidence, with full respect to international law and fundamental rights including the protection of personal data, </p> <p class="text-left">• to encourage exchanges of good practices on the promotion and protection of fundamental rights in cyberspace with all relevant stakeholders, in particular the freedom of opinion and expression and the right to privacy,</p> <p class="text-left">• to promote a universal, affordable and equal access to the Internet and in particular the empowerment of women and girls in policy development and use of Internet,</p> <p class="text-left">INVITES the EU and its Member States to promote the implementation and make better use of the EU Guidelines on the Freedom of Expression online and offline and of the EU Guidelines on Human Rights Defenders, namely by:</p> <p class="text-left">• developing and promoting best practices to ensure respect for human rights online, including in the framework of the export of technologies that could be used for surveillance or censorship by authoritarian regimes,</p> <p class="text-left">• supporting the efforts of third countries to increase and improve their citizens' access to and secure use of information and communication technology (ICT) and the Internet,</p> <p class="text-left">• raising awareness and empowering stakeholders to use ICT and the Internet to promote human rights and fundamental freedoms in cyberspace,</p> <br> <p class="text-left"><b>Norms of behaviour and application of existing international law in the field of international security</b></p> <p class="text-left">WELCOMES the work done within the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, notably its 2013 report, and the consensus achieved that international law, in particular the Charter of the United Nations, is applicable to cyberspace and is essential to reduce risks and maintain peace and stability,</p> <p class="text-left">WELCOMES the adoption of a first set of Cyber Security Confidence Building Measures in the OSCE framework and LOOKS FORWARD to their implementation as well as to the development of measures aimed at enhancing confidence and cooperation,</p> <p class="text-left">REITERATES the EU’s and its Member States' commitment to actively support the development of such measures, through a consolidated and coordinated approach and including in other regional fora such as the ASEAN Regional Forum to reduce the risk of misperceptions in their relations and encourages greater Member States' engagement to this end,</p> <p class="text-left">ENCOURAGES the EU and its Member States:</p> <p class="text-left">- to focus efforts in a coherent and coordinated manner and contribute actively to the achievement of a global common understanding on how to apply existing international law in cyberspace and to the development of norms for responsible state behaviour in cyberspace with a view to increasing transparency and trust, consistent with existing international law provisions,</p> <p class="text-left">- to strongly uphold the principles regarding State responsibility for internationally wrongful acts and to take the initiatives necessary at national, regional and international level to ensure that they are fully respected and enforced in cyberspace,</p> <p class="text-left">- to strongly uphold the position that existing international law is applicable in cyberspace, EMPHASISES the key role played by the EU and its Member States in international cyberspace policy debates and events, such as the "London process" and its follow-up conferences in Budapest and Seoul, and ENCOURAGES them to continue their efforts to support the next Global Conference on Cyber Space in the Hague in 2015, by contributing to the positive development and progress of that process while ensuring consistency of the messages delivered from the EU side,</p> <p class="text-left">RECALLS its recently adopted Conclusions on Internet Governance8 which contain the EU's position on this issue and STRESSES the importance of those Conclusions given that Internet governance is an integral part of the common and comprehensive EU approach for cyber diplomacy,</p> <p class="text-left">RECOGNISES that Internet and digital technology have become the backbone of economic growth of the EU internal market and a critical source which all economic sectors rely on,</p> <p class="text-left">UNDERLINES the need for the EU to advance the digital single market and to promote its regulatory framework in order to further develop competitive and sustainable European digital enterprises and e-commerce,</p> <p class="text-left">EMPHASISES that the digital economy can only reach its true potential by ensuring the protection of data online as well as of the underlying infrastructure and areas that face increasing opportunities and challenges with innovative technologies such as cloud, mobile and social computing and analytical tools applied to Big Data,</p> <p class="text-left">ACKNOWLEDGES the importance of cross-border data flows for promoting growth and economic development and of ensuring trust through the availability, security, reliability and interoperability of online communications,</p> <p class="text-left">ACKNOWLEDGES the importance of the EU in playing an active role in ICT standard setting, pursuing as far as possible the development of global or globally interoperable standards ensuring a high level of security, promoting competitive, cross-border online trade and new business models through inclusive and bottom-up processes and taking into account the on-going work in the OECD framework, including on taxation-related issues,</p> <p class="text-left">ENCOURAGES the EU and Member States together with the private sector, technical and academic communities and civil society to work towards the enhancement of open, interconnected and trustworthy solutions to create a dynamic, competitive and conducive environment for European industries and services ensuring that the EU stands out as a global player and as a market for investment and innovation,</p> <p class="text-left">INVITES the EU and its MS:</p> <p class="text-left">– to place specific emphasis on further promoting the EU digital single market and enhancing IT security, promoting digital trust and enabling greater use of ICTs and ICT driven growth;</p> <p class="text-left">– to move forward the relevant negotiations within the respective international and multilateral fora as well as to support the inclusion of the digital economy in their respective agendas;</p> <p class="text-left">– to systematically consider addressing challenges related to data protection in cooperation with key international partners and countries, and to maintain a high level of IT-security, including relevant standards, and in doing so, to explore the avenues to promote the interoperability and portability of users’ content and data between different digital platforms;</p> <p class="text-left">– to promote the Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data as a minimum standard for data protection in third countries,</p> <p class="text-left">– to support market access in a spirit of reciprocal and mutual benefit with third countries when negotiating free trade agreements taking into account EU values and norms, including data protection,</p> <br> <p class="text-left"><b>Cyber capacity building and development</b></p> <p class="text-left">REITERATES the importance of cyber capacity building in third countries as a strategic building block of the evolving cyber diplomacy efforts of the EU towards the promotion and protection of human rights, rule of law, security, growth and development,</p> <p class="text-left">EMPHASISES the importance of access to and use of open and secure ICTs for enabling economic growth and innovation, accelerating progress and driving political, social and economic development worldwide,</p> <p class="text-left">RECOGNISES the need to promote the rule of law and to combat the increase in organised crime and unlawful acts in cyberspace, in line with human rights law and international mutual legal assistance agreements,</p> <p class="text-left">CONTINUES promoting the Council of Europe Convention on Cybercrime as a framework for international cooperation,</p> <p class="text-left">STRONGLY ENCOURAGES the EU and its Member States to:</p> <p class="text-left">– develop a coherent and global approach to cyber capacity building, which on one side brings together technology, policy and skills development within a broader and overreaching EU development and security agenda, and on other side facilitates the design of an effective EU model for cyber capacity building;</p> <p class="text-left">– make cyber capacity building an integral part of wider global approaches in all cyberspace domains, including through close cooperation with academia and the private sector as well as European Union Network and Information Security Agency (ENISA), the European Cybercrime Centre within Europol and the EU Institute for Security Studies;</p> <p class="text-left">– support new initiatives on cyber capacity building that take stock of, build on, and complement existing initiatives emphasising the importance of access to and use of unhindered, uncensored and non-discriminatory use of open and secure ICT for fostering open societies and enabling economic growth and social development;</p> <p class="text-left">– promote sustainable cyber capacity building, when appropriate, together with international partners, as well as streamlining and prioritising funding, including by making full use of the relevant EU external financial instruments and programmes;</p> <p class="text-left">– promote the Council of Europe Convention on Cybercrime internationally as the legal framework of reference for international cooperation in fighting cybercrime at a global level and support third countries to accede to the Convention and to introduce a minimum national legal framework to combat cybercrime as well as to develop the necessary investigation and prosecution capacities;</p> <p class="text-left">– tackle growing cyber threats and challenges by increasing resilience of critical information infrastructure and by reinforcing close cooperation and coordination among international stakeholders through initiatives such as the development of confidence building, common standards, international cyber exercises, awareness-raising, training, research and education, incident response mechanisms,</p> <p class="text-left">– leverage the expertise of national cyber organisations, including computer security incident response teams, high-tech crime units and other competent national bodies,</p> <br> <p class="text-left"><b>Strategic engagement with key partners and international organisations</b></p> <p class="text-left">RECOGNISES that due to the global cross-cutting nature, scope and reach of the digital realm, most of the policy decisions on cyberspace-related issues have international implications that necessitate active international engagement, collaboration and coordination in the EU,</p> <p class="text-left">EMPHASISES that many recent cyberspace developments have taken place in different international organisations, in particular the UN, Council of Europe, OSCE, OECD, NATO, AU, OAS, ASEAN, ARF, etc.,</p> <p class="text-left">ENCOURAGES the EU and its Member States to prepare cyber dialogues within the framework of effective policy coordination, avoiding duplication of efforts and taking into account the broader EU political and economic interests, collectively promoted by all EU actors,</p> <p class="text-left">RECALLS that structured and overarching EU strategic cyber consultations have already been launched with the US, China, Japan, India, South Korea and Brazil, and that negotiations to launch such discussions are currently on-going with other partners; in addition numerous sectorial dialogues are on-going on ICT, organised crime and human rights, with the aim of building trust and confidence as well as providing platforms for exchanging best practices, promoting human rights and the rule of law, improving security and tackling issues of common concern,</p> <p class="text-left">REAFFIRMS the call in the EU Cybersecurity strategy:</p> <p class="text-left">• to seek Member States’ cyber policy expertise and their experience from bilateral engagements/cooperation to develop common EU messages on cyberspace issues,</p> <p class="text-left">• to work towards achieving a coherent EU international cyberspace policy by increasing engagement with key international partners and organisations, by improving coordination of global cyber issues, mainstreaming the strategic external relations and improving internal consultations;</p> <p class="text-left">• to support the creation of relevant national policies, strategies and institutions in third countries with the aim of enabling the full economic and social potential of ICT, developing resilient systems and mitigating cyber risks for the EU;</p> <p class="text-left">INVITES the EU and its Member States:</p> <p class="text-left">– to ensure that the European activities in cyberspace and national policies, law and initiatives are designed in a way to allow for a coherent approach and avoid duplication;</p> <p class="text-left">– to improve coordination of dialogues with partners and to engage them in bilateral, regional or global settings;</p> <p class="text-left">– to maintain close relations with the relevant international organisations where the major cyber developments are taking place;</p> <p class="text-left">– to engage civil society organisations, the private sector, technical and academic communities, where appropriate, in shaping and implementing EU cyberspace policy;</p> <p class="text-left">– to share information on their bilateral cyber consultations,</p> <p class="text-left">AND</p> <p class="text-left">ENCOURAGES the EU and its Member States to support on-going implementation of these Conclusions by keeping EU strategic objectives under constant review and by setting up EU cyber diplomacy policy priorities,</p> <p class="text-left">INVITES the Member States, the Commission and the High Representative to regularly report to the Council on the implementation of these conclusions and ENCOURAGES the regular collaboration between the competent Council preparatory bodies, in particular with the Friends of the Presidency Group on Cyber Issues which should continue serving as a comprehensive crosscutting forum for EU cyber policy coordination and cooperation.</p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > <img src="Logos/INSI8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> </div> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>