Malware Round Two: EU’s Cybersecurity Champ Defends Bloc Via Information Sharing


 

eustarz

A massive international cyberattack centered in Europe begins disrupting major companies. Sound familiar? It does to the European Union’s cybersecurity defense agency since they have now battled dramatic malware attacks twice in last two months—first with WannaCry and then with Petya.

The EU Agency for Network and Information Security (ENISA) is getting lots of practice in how to coordinate cyberattack defenses between the public and private sectors. ENISA also cooperated with the computer security incident response team (CSIRT) of the 28 EU member countries.

“By utilising effective channels of communications, EU CSIRTs have managed to exchange information in a secure and prompt manner,” ENISA said.

“For the second time within two months, the world is faced with a major global cyber-attack.  ENISA is once again closely monitoring the situation and working together with the Member States CSIRTs to respond to the cyberattack thereby helping to manage the cybersecurity of European citizens and businesses,” Udo Helmbrecht, executive director of ENISA, said.

WannaCry provided the EU with its first opportunity to present a coordinated response to a cyberattack, Helmbrecht previously told Bloomberg BNA. Businesses benefited from an improved information sharing and coordination system that allowed them to receive intelligence from companies in other countries that were first hit by the attack, he said.

The cooperative EU-level information sharing softens the spread of cyberattacks, allowing law enforcement to prepare for attacks before they reach networks in their countries.

ENISA said that this information sharing “has resulted in a synchronised cross-border information flow, fast incident response on a national level, and better recognition and understanding of the threat and mitigation measures.” 

To keep up with the constantly evolving world of privacy and security sign up for the Bloomberg BNA Privacy and Security Update.