ComputerWeekly.com 09月29日
荷兰启动网络韧性网络,加强国家数字防御
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

荷兰启动了名为“网络韧性网络”(Cyber Resilience Network)的公私合作伙伴关系,旨在彻底改变国家应对数字威胁的方式。该计划由国家网络安全中心(NCSC-NL)提出,旨在将1152个组织连接到一个协作框架中,该框架将超越简单信息共享,涵盖协调事件响应、培训和威胁情报。此举正值关键时刻,一份政府报告揭示了国家曾险些遭遇可能导致关键公共服务停滞的毁灭性IT危机。报告指出,目前组织遭受网络攻击的几率为八分之一,但对此类危机的准备程度却令人担忧地低下。

🛡️ **荷兰启动网络韧性网络,强化国家数字防御体系**:荷兰国家网络安全中心(NCSC-NL)牵头推出“网络韧性网络”(Cyber Resilience Network),这是一个由政府与私营部门合作组成的伙伴关系,旨在全面提升国家的数字防御能力。该网络计划连接超过1152个组织,构建一个超越信息共享的协作框架,涵盖事件响应、培训和威胁情报等关键领域。

🚨 **国家面临严峻网络威胁,IT危机警报拉响**:荷兰政府的一份报告显示,国家曾一度濒临一场可能导致关键公共服务瘫痪的IT危机。目前,组织遭受网络攻击的概率高达八分之一,但对这类危机的准备不足问题依然严峻,凸显了加强网络韧性的紧迫性。

🤝 **“数字安全是共同责任”,构建信任与共享能力**:NCSC-NL的官员强调,数字安全是所有参与者的共同责任。网络韧性网络正是政府与行业携手合作,共同增强荷兰王国整体数字韧性的典范。该网络通过系统化的信息交流、协调的事件响应、共享的知识以及联合培训演习,实现了集体韧性的提升,而非各组织独立应对。

🌐 **高度数字化带来的风险与挑战**:作为欧洲最发达的数字化国家之一,荷兰在享受数字化便利的同时,也面临着严峻的挑战。政府机构高度依赖外部IT供应商,尤其是美国“超级云服务商”,这导致了显著的“集中风险”。网络韧性网络的建立旨在应对这些威胁,通过建立信任和共享能力来增强国家的整体网络安全。

<div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{51}" paraid="1464728848"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The Netherlands has launched a Cyber Resilience Network, a public-private partnership aimed at fundamentally overhauling the nation’s approach to digital </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing">.&nbsp;</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{65}" paraid="436163315"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The initiative, detailed in a </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2025/september/10/bouwplan-cyberweerbaarheidsnetwerk/CWN+Bouwplan+2025.pdf"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">comprehensive </span><span data-ccp-charstyle="Hyperlink">building </span><span data-ccp-charstyle="Hyperlink">plan</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> from the National Cyber Security Centre (NCSC-NL), aims to connect over 1,152 </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> in a collaborative framework that extends far beyond simple information sharing to include coordinated incident response, training and threat intelligence. </span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{8}" paraid="1089799130"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The move comes at a critical time, as a stark government report reveals just how close the country came to a debilitating IT crisis that could have brought essential public services to a standstill.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{84}" paraid="2081641295"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The urgency for this </span><span data-ccp-parastyle="No Spacing">new approach</span><span data-ccp-parastyle="No Spacing"> becomes clear when examining the statistics. The chance of an </span><span data-ccp-parastyle="No Spacing">organisation</span><span data-ccp-parastyle="No Spacing"> being hit by a cyber incident is now one in eight, yet preparation for such a crisis </span><span data-ccp-parastyle="No Spacing">remains</span><span data-ccp-parastyle="No Spacing"> alarmingly low</span><span data-ccp-parastyle="No Spacing">, according to the</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">NCSC </span><span data-ccp-parastyle="No Spacing">building plan</span><span data-ccp-parastyle="No Spacing">. This </span><span data-ccp-parastyle="No Spacing">isn’t</span><span data-ccp-parastyle="No Spacing"> merely a private sector problem. </span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{84}" paraid="2081641295"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">A recently published</span><span data-ccp-parastyle="No Spacing"> Dutch</span><span data-ccp-parastyle="No Spacing"> government report, titled </span></span><em><a rel="noreferrer noopener" target="_blank" href="https://www.rijksoverheid.nl/binaries/rijksoverheid/documenten/rapporten/2025/09/12/rapport-van-kwetsbaar-naar-weerbaar/ABDTOPConsult+Rapport+geleerde+lessen+ICT+uitbesteding+Februari+2025+Definitief+-vertrouwelijk+%28002%29.pdf"&gt;&lt;span xml:lang="EN-US" data-contrast="none">From vulnerable to resilient</span></a></em><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">, paints a sobering picture of the Dutch government’s own digital dependencies, revealing that the </span><span data-ccp-parastyle="No Spacing">near-collapse</span><span data-ccp-parastyle="No Spacing"> of a major IT supplier in early 2024 could have triggered a national crisis</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{115}" paraid="1703362729"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The report concluded that government bodies are insufficiently prepared for the acute and prolonged failure of outsourced IT services, having become what </span><span data-ccp-parastyle="No Spacing">researchers</span><span data-ccp-parastyle="No Spacing"> term “analogously incompetent”.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{115}" paraid="1703362729"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">In a world </span><span data-ccp-parastyle="No Spacing">where</span><span data-ccp-parastyle="No Spacing"> relying on physical processes is no longer </span><span data-ccp-parastyle="No Spacing">an option</span><span data-ccp-parastyle="No Spacing">, this digital vulnerability poses a critical threat to national stability. The potential consequences would have been severe: no benefit payments to millions of Dutch citizens, a complete halt to legal proceedings, healthcare </span><span data-ccp-parastyle="No Spacing">indication</span><span data-ccp-parastyle="No Spacing"> processes grinding to a standstill, and operational problems across </span><span data-ccp-parastyle="No Spacing">numerous</span><span data-ccp-parastyle="No Spacing"> government </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <h2 paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{129}" paraid="2041808812">Shared responsibility</h2> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{154}" paraid="1620528678"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">It is hardly surprising, then, that the Dutch government is</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> pursuing a comprehensive strategy to address these vulnerabilities. The Cyber Resilience Network </span><span data-ccp-parastyle="No Spacing">represents</span><span data-ccp-parastyle="No Spacing"> a significant evolution from the </span><span data-ccp-parastyle="No Spacing">previous</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">n</span><span data-ccp-parastyle="No Spacing">ationwide </span><span data-ccp-parastyle="No Spacing">network (</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">Landelijk</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">Dekkend</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">Stelsel</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">)</span><span data-ccp-parastyle="No Spacing">, which was primarily focused on information sharing between </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing">. The new network is built around five core functions that transform how the Netherlands </span><span data-ccp-parastyle="No Spacing">collectively approaches cyber </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{161}" paraid="205206403"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">“Digital security is a shared responsibility,” said Belle Webster, a board member at the NCSC-NL and unit manager for the Cooperation and Knowledge Exchange, in a </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.linkedin.com/pulse/cwn-bouwplan-voor-stevigere-basis-cyberweerbaarheid-pavme/"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">LinkedIn post</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> announcing the network’</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">s launch.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{161}" paraid="205206403"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">“The Cyber Resilience Network is a prime example of how government and industry are coming together to strengthen the digital resilience of the entire Kingdom of the Netherlands,” she added, highlighting the collaborative nature of the initiative.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{192}" paraid="1812696697"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">This expansion reflects a growing understanding that individual </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> can no longer fend for themselves against sophisticated cyber threats. </span><span data-ccp-parastyle="No Spacing">Compare it with burglars</span><span data-ccp-parastyle="No Spacing">, who will always seek out the house that is easiest to break into.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{192}" paraid="1812696697"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">In the digital realm, attackers are increasingly targeting supply chains and managed service providers, knowing that a single breach can provide access to dozens of victims. The <em>From vulnerable to resilient</em> report highlights this “digital monoculture”, where many </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> depend on a small number of providers, as a major </span><span data-ccp-parastyle="No Spacing">risk of concentration</span><span data-ccp-parastyle="No Spacing">.</span></span></p> </div> <div> <h2 paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{210}" paraid="1146228926">Heavily digitised</h2> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{196}" paraid="1903053106"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The Netherlands’ position as one of the top five most </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> countries in Europe has created both opportunities and vulnerabilities. ICT plays a crucial role in the primary processes of major government </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> such as DUO (student finance), SVB (social security), UWV (employment services), CJIB (traffic fines) and the Tax Authority.</span></span></p> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{196}" paraid="1903053106"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">Even </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> with significant physical assets and processes, including Rijkswaterstaat (infrastructure), RIVM (public health), </span><span data-ccp-parastyle="No Spacing">Defence</span><span data-ccp-parastyle="No Spacing">, and the National Police, have become heavily </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{226}" paraid="1193424990"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">This </span><span data-ccp-parastyle="No Spacing">digitisation</span><span data-ccp-parastyle="No Spacing"> has led to extensive outsourcing of ICT activities to external suppliers. While these arrangements offer opportunities in terms of technological development, digital capabilities and professional services, they have also made government </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> more dependent on ICT suppliers. The concentration risk has increased significantly, with many companies and government bodies housing their ICT with US “</span><span data-ccp-parastyle="No Spacing">hyperscalers”</span><span data-ccp-parastyle="No Spacing"> such as Microsoft, Amazon and Google.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{236}" paraid="1524182398"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The Cyber Resilience Network is designed to counter these very threats by creating a network of trust and shared capabilities. Rather than each </span><span data-ccp-parastyle="No Spacing">organisation</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">attempting</span><span data-ccp-parastyle="No Spacing"> to build comprehensive cyber </span><span data-ccp-parastyle="No Spacing">defences</span><span data-ccp-parastyle="No Spacing"> independently, the CWN enables collective resilience through systematic information exchange, coordinated incident response, shared knowledge and joint training exercises.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{236}" paraid="1524182398"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The plan includes concrete priorities for the coming year, focusing on </span><span data-ccp-parastyle="No Spacing">establishing</span><span data-ccp-parastyle="No Spacing"> the network’s core functions and onboarding key partners from both public and private sectors.</span></span></p> </div> <div> <h2 paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{246}" paraid="1778717408">Preparation for NIS-2</h2> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{3}" paraid="1583695161"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The timing of these initiatives is particularly significant. The </span></span><em><a rel="noreferrer noopener" target="_blank" href="https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2024/oktober/28/csbn-2024-turbulente-tijden-onvoorziene-effecten/Cybersecuritybeeld+2024_turbulente+tijden%2C+onvoorziene+effecten.pdf"&gt;&lt;span xml:lang="EN-US" data-contrast="none">Cybersecurity assessment Netherlands 2024</span></a></em><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">emphasises</span><span data-ccp-parastyle="No Spacing"> the threat of large-scale outages and explicitly mentions the risk of a “digital monoculture”. State actors and criminal </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> are increasingly targeting ICT suppliers, knowing that once inside, they potentially have access to many </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> that have housed their ICT there.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{18}" paraid="1305877012"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">Recent incidents have </span><span data-ccp-parastyle="No Spacing">demonstrated</span><span data-ccp-parastyle="No Spacing"> the vulnerability of </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> systems. Major disruptions have occurred at </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/feature/Dutch-universitys-rapid-response-saved-it-from-ransomware-devastation"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">TU Eindhoven</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> (2025),</span><span data-ccp-parastyle="No Spacing"> </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366596334/NCSC-Beware-of-criminal-CrowdStrike-opportunists"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">Crowdstrike</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> (2024) and </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/252477997/Maastricht-University-pays-200000-to-Russian-hackers"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">Maastricht University</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> (20</span><span data-ccp-parastyle="No Spacing">20</span><span data-ccp-parastyle="No Spacing">). While these incidents were often resolved in days or weeks </span><span data-ccp-parastyle="No Spacing">through intensive effort, the question </span><span data-ccp-parastyle="No Spacing">remains</span><span data-ccp-parastyle="No Spacing"> how resilient governments would be if major ICT incidents could not be resolved in weeks or months.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{51}" paraid="1549480766"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The </span><span data-ccp-parastyle="No Spacing">Dutch </span><span data-ccp-parastyle="No Spacing">government’s </span><span data-ccp-parastyle="No Spacing">new approach</span><span data-ccp-parastyle="No Spacing"> acknowledges that existing structures, knowledge and measures are insufficiently </span><span data-ccp-parastyle="No Spacing">utilised</span><span data-ccp-parastyle="No Spacing"> for mitigating the risk and impact of acute and prolonged ICT outages. In audit terms of “design, existence and operation”, much is available on the design front, but implementation and testing are often lacking.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{65}" paraid="539273073"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The network’s establishment </span><span data-ccp-parastyle="No Spacing">coincides with the Netherlands’ preparation</span><span data-ccp-parastyle="No Spacing"> for the implementation of the Cybersecurity Act (NIS-2) later in 2025, which will strengthen requirements for digital resilience. </span><span data-ccp-parastyle="No Spacing">However, the government report notes that compared with legislation in the financial sector, such as the Digital Operational Resilience Act, current frameworks </span><span data-ccp-parastyle="No Spacing">remain</span><span data-ccp-parastyle="No Spacing"> insufficiently specific about risks related to large-scale, acute and prolonged outages of ICT service providers</span><span data-ccp-parastyle="No Spacing">.</span></span></p> </div> <div> <h2 paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{83}" paraid="1602996519">Collaboration is key</h2> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{210}" paraid="1309255072"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">This shift from individual </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing"> to collective resilience marks a pivotal moment for the Netherlands. The government’s dual-pronged approach acknowledges the reality that in the face of sophisticated and persistent cyber threats, the only </span><span data-ccp-parastyle="No Spacing">viable</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing"> is a shared one.</span></span></p> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{210}" paraid="1309255072"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The </span><span data-ccp-parastyle="No Spacing">Cyber Resilience Network </span><span data-ccp-parastyle="No Spacing">represents</span><span data-ccp-parastyle="No Spacing"> not just a technical solution, but a fundamental reimagining of how a highly </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> nation can </span><span data-ccp-parastyle="No Spacing">maintain</span><span data-ccp-parastyle="No Spacing"> its digital sovereignty while </span><span data-ccp-parastyle="No Spacing">benefiting</span><span data-ccp-parastyle="No Spacing"> from the efficiencies of modern ICT services.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{103}" paraid="1770943791"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The success of this initiative will depend on effective implementation and genuine collaboration between public and private sectors. As the Netherlands moves forward with this ambitious plan, it may well serve as a model for other highly </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> nations grappling with similar challenges.</span></span></p> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{103}" paraid="1770943791"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The foundation for this transformation is information and collaboration. Everything else, as they say, is noise.</span></span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></p> <div class="extra-info"> <div class="extra-info-inner"> <h3 class="splash-heading">Read more about cybersecurity in The Netherlands</h3> <div> <ul class="default-list"> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">The Netherlands is facing a growing cyber security crisis, with a staggering 66% of Dutch businesses </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366624847/Dutch-businesses-lag-behind-in-cyber-resilience-as-threats-escalate"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">lacking adequate cyber resilience, according to research</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">.</span></span></li> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366538512/Netherlands-makes-case-for-harmonisation-of-cloud-security-standards"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">Harmonisation of cyber security standards is necessary</span></span></a><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink"> to reduce the regulatory burden on Dutch SMEs – and regulators need to cooperate better</span></span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:0,&quot;335559739&quot;:600}">.</span></li> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><span data-ccp-charstyle="Hyperlink">Dutch method to counter deepfakes </span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366628022/Dutch-researchers-use-heartbeat-detection-to-unmask-deepfakes"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate</span></span></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:0,&quot;335559739&quot;:600}">.</span></li> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><span data-ccp-charstyle="Hyperlink">Dutch PhD study&nbsp;</span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366620387/Dutch-police-disrupt-half-of-ransomware-operations-finds-embedded-PHD-student"&gt;&lt;span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">reveals the impact of </span><span data-ccp-charstyle="Hyperlink">centralised</span><span data-ccp-charstyle="Hyperlink"> intelligence and strategic interventions</span></span></a><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink"> in the fight against ransomware</span></span>.&nbsp;</li> </ul> </div> </div> </div></div><div class="ad-wrapper ad-embedded no-float"> <div id="halfpage" class="ad ad-hp"> <script>GPT.display('halfpage')</script> </div> <div id="mu-1" class="ad ad-mu"> <script>GPT.display('mu-1')</script> </div> </div>

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络安全 荷兰 数字韧性 国家安全 公私合作 Cybersecurity Netherlands Digital Resilience National Security Public-Private Partnership
相关文章