SlideShare a Scribd company logo
Coordinated Vulnerability Disclosure Policies in
the EU
Code Blue Security Conference, Tokyo 27-28 October 2022
Lorenzo Pupillo, Associate Senior Research Fellow and Head of the
Cybersecurity@CEPS Inititiative, CEPS, Brussels
ENISA Study 2021
ENISA: Project Officers
• Marnix Dekker
• Evangelos Kantas
• Slawomir Bryska
CEPS: Research Team
• Lorenzo Pupillo
• Carolina Polito
• Francesco Campoli
Wavestone Research Team
• Nick Conway
• Aude Thirriot
• Thiago Barbizan
• Solène Drugeot
• Cristian Michael Tracci
Agenda
Current state of play of CVD policies
• State of play in the EU Member States
• State of play in non-EU countries
Key findings on CVD national policies
• Level of criticality of the vulnerability treatment and
CVD processes
• Good practices on CVD policy and elements of a
CVD process
Overview of challenges and issues on CVD
national policies
• Challenges and issues related to CVD policies
• Suggestions on how to overcome CVD policy
challenges shared by interviewees
CURRENT STATE OF PLAY OF
CVD POLICIES
State of play in the EU Member States (1/3)
While evolving in a fragmented EU environment, multiple
EU Member States are making steps forward in the
development of national CVD policies but at different
paces.
• Belgium, France, Lithuania, and the Netherlands
have implemented CVD policies.
• 4 Member States are on the point of implementing a
policy: the proposal is either being examined at the
level of policymakers or is currently tested in Pilot
Projects.
State of play in the EU Member
States (2/3)
• 10 Member States are in the process of
implementing a national CVD policy. However,
failure in reaching consensus at the political or
legislative level hampered such a process.
• Finally, 9 Member States has not implemented a
CVD policy and the process for establishing one has
not yet started.
State of play in the EU Member
States (3/3)
While evolving in a fragmented
EU environment, multiple EU
Member States are making
steps forward in the
development of national CVD
policies but at different paces.
Implementation of CVD policy at national level in Europe
KEY FINDINGS ON CVD
NATIONAL POLICIES
Level of criticality of the
vulnerability treatment LIFECYCLE
and CVD processes
• Discovery: to reduce a vulnerability’s
harmfulness, someone has to discover it
in the first place.
• Handling: If the vulnerability is in a
product’s code (code vulnerability), the
‘code owner’ needs to develop mitigation
and distribute it to all users
(‘vulnerability handling’).
• Management: if the vulnerability is a
misconfiguration or unapplied mitigation
(often a patch) in an information system
(system vulnerability), the ‘system
owner’ needs to manage it, i.e., apply the
patch or change the system or product
configuration as soon as possible.
• Disclosure: In most cases, code
vulnerability information needs to be
disclosed publicly or at least to the
security community or targeted
audiences
9
GOOD
PRACTICES ON
CVD POLICY
AND
ELEMENTS OF
A CVD
PROCESS
Content of a CVD Policy
• The CVD policy shall contain a description of the
mutual obligations of the involved parties, namely:
• Authorization to Access the Computer System
(Proportionality)
• Information required to report a vulnerability
• Confidentiality
• Procedural deadlines (within 90 days)
• Communication channels
• Reward to Security researchers
• Public disclosure
GOOD PRACTICES ON CVD
POLICY AND ELEMENTS OF A
CVD PROCESS
Member States have highlighted a series of procedures they have implemented that should be regarded as best practices:
• References to two standards: ISO/IEC 2914741 (disclosing vulnerability) and ISO/IEC 3011142 (processing procedures for the
reported vulnerability
• Bottom-up Approach (The Netherlands)
• Talk to the vendors
• Familiarise with the ethical hackers community
• Insulate the information
• Implement the OECD’s recommendations/good practices
• Adopt the Common Security Advisory Framework
ZOOMING on SOME
Elements of CVD processes
• Entities involved: role of the national CERT and/or the National
Cybersecurity Authority: (observer or central role )
• Tools: dedicated website, implementation of ticketing systems,
custom tools (Cuckoo Sandbox), validation tools (Burp suite),
warning and information systems (Common Security Advisory
Framework), communication tools especially in multiparty
processes, find vulnerabilities through opensource intelligence
software
• Awareness raising campaigns: Lithuania: Cybersec Breakfast;
The Netherlands: Hack right
• Operational and crisis management activities
OVERVIEW OF CHALLENGES
AND ISSUES ON
CVDNATIONAL POLICIES
CHALLENGES
AND ISSUES
RELATED TO
CVD POLICIES
Overview of the
challenges
LEGAL CHALLENGES
• Criminal law: According to the Cybercrime Convention, intentionally accessing a computer system
without rights is a criminal offence.
• Copyright law: Researchers can breach copyright law when the information disclosed entails
portions of copyrighted code. The vulnerability owners can establish exemptions, enabling the
possibility of safe harbours
• Data protection law: Researchers, discovering vulnerabilities may access personal data which
could be interpreted as a breach of data protection law.
• Contract Law: Bug bounty policies and in some cases vulnerability disclosure policies represent the
terms of a contract between the vulnerability owner and the researcher. Breaching the terms of
the contract entails legal liability and risks for the researcher,
• Export control legislation and regulation are often cited as a legal risk for researchers as they may
apply to tools and knowledge used to discover vulnerabilities
Other
CHALLENGES
Economic Challenges Political challenges
• Vulnerabilities and software market
dynamics
• Lack of cooperation among
stakeholders
• Limited market incentives for
security researchers to participate in
CVD programs
• Most security researchers are
activists not professionals employed
by private companies
• Lack of resources and skills to
implement CVD polices
• Cost of implementation and
operation of CVD policies are
considered as relatively less
impactful
• Top Down or Bottom-up Approach
• The role of Government
• Updating imperfect cybercrime
and Intellectual Property
frameworks
• Support and enable CVD policies
• Leading by example in
establishing CVD policies
(adapting CVD within the
government, etc..)
• The role of the private sector
• Leader or follower?
Overcome
the
challenges
Overcome the Legal Challenges
• Two questions relating to the link of vulnerabilities discovery and criminal
offence:
• Circumstances under which finding vulnerabilities may be associated with
criminal offense (substantial).
• Conditions to be met for any crimes associated with finding vulnerabilities
to be prosecuted (procedural).
• Since according to the Budapest Convention only the ‘unauthorised access
should be considered as criminal offence’, computer system owners can
authorise access through the publication of a CVD policy; EU countries could
implement CVD policies that will offer a limited liability waiver to security
researchers.
• Since Criminal Law is a prerogative of Member States , they could amend their
criminal law to create the legal certainty for security researchers.
• The EU could amend the 2013/40/EU Cybercrime Directive to offer legal
certainty to security researchers.
• The protection of security researchers could also be achieved by recognising
the status of whistle-blower in the sense of Directive 2019/1937.
• It would be helpful to define the role of ethical hackers: a law could be
drafted defining ad-hoc criteria.
Overcome
the
challenges
• Overcome the economic challenges
• Promote appropriate policies aimed at encouraging security researchers to actively
participate in CVD programmes
• Specific role for bug bounty programmes: should the EU set up a program or rather
harmonise regulation an practices across the EU Member States?
• Support to research programmes to foster CVD policies among public and private
researchers in Europe (Digital Europe Programme and Horizon Europe)
• The EU should make available funding and programmes to train people and make
viable the development of CVD policies in the EU
• Overcome the political challenges
• Top Down or Bottom-up Approach: An EU approach could take the form of a common
model of CVD at the EU level, promoting coordination at the EU and international
level.
• The role of Government:
• Updating cybercrime and intellectual property frameworks to better protect
security researchers, for example through ‘safe harbours’,
• Leading by example in the establishment of a CVD policy (e.g., CVD within the
government, etc.)
• The role of the private sector:
• Private entities should not wait for government policy interventions and define CVD
polices to publish on the organisation’s website.
CVD in NIS 2
• The Directive also establishes a framework for
Coordinated Vulnerability Disclosure and
requires Member States to designate CSIRTs to
act as trusted intermediaries and facilitate the
interaction between the reporting entities and
the manufacturers or providers of ICT products
and ICT services. ENISA is required to develop
and maintain a European vulnerability registry
for the discovered vulnerabilities.
CVD and
Cyber
Resilience
Act
1 Place du Congres, 1000 Brussels
Tel: (+32 2)229 39 11
info@ceps.eu
Thank You! @CEPS_ThinkTank

More Related Content

Similar to [cb22] "The Present and Future of Coordinated Vulnerability Disclosure" International Panel Discussion (3) by Lorenzo Pupillo

OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security Framework
Norbi Hegedus
 
State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...
Oles Kulchytskyy
 
CRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshopCRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshop
Trilateral Research
 
Bonsucro Global Week 2022 - Social Dialogue
Bonsucro Global Week 2022 - Social DialogueBonsucro Global Week 2022 - Social Dialogue
Bonsucro Global Week 2022 - Social Dialogue
Bonsucro1
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
 
Lecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptxLecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptx
moushalivindi
 
Enabling technologies cv presentation
Enabling technologies cv presentationEnabling technologies cv presentation
Enabling technologies cv presentation
CSR Europe
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
Trilateral Research
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
IT Governance Ltd
 
Design principles for differentiated integration schemes
Design principles for differentiated integration schemesDesign principles for differentiated integration schemes
Design principles for differentiated integration schemes
Paolo Chiocchetti
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
ocial support and long term care for older people – Ghenta
ocial support and long term care for older people – Ghentaocial support and long term care for older people – Ghenta
ocial support and long term care for older people – Ghenta
CARER+ Project
 
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECDStrengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
OECD Governance
 
e-HealthWhitepaper
e-HealthWhitepapere-HealthWhitepaper
e-HealthWhitepaper
Source Code Control Limited
 
Trigger.eu: Cocteau game for policy making - introduction and demo
Trigger.eu: Cocteau game for policy making - introduction and demoTrigger.eu: Cocteau game for policy making - introduction and demo
Trigger.eu: Cocteau game for policy making - introduction and demo
Marco Brambilla
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
ITU
 
wipo_ip_dar_13_d_radauer.pdf
wipo_ip_dar_13_d_radauer.pdfwipo_ip_dar_13_d_radauer.pdf
wipo_ip_dar_13_d_radauer.pdf
Santi Ferrandiz
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
APNIC
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
EUBrasilCloudFORUM .
 
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
Tom Lyons
 

Similar to [cb22] "The Present and Future of Coordinated Vulnerability Disclosure" International Panel Discussion (3) by Lorenzo Pupillo (20)

OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security Framework
 
State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...
 
CRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshopCRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshop
 
Bonsucro Global Week 2022 - Social Dialogue
Bonsucro Global Week 2022 - Social DialogueBonsucro Global Week 2022 - Social Dialogue
Bonsucro Global Week 2022 - Social Dialogue
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Lecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptxLecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptx
 
Enabling technologies cv presentation
Enabling technologies cv presentationEnabling technologies cv presentation
Enabling technologies cv presentation
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Design principles for differentiated integration schemes
Design principles for differentiated integration schemesDesign principles for differentiated integration schemes
Design principles for differentiated integration schemes
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
ocial support and long term care for older people – Ghenta
ocial support and long term care for older people – Ghentaocial support and long term care for older people – Ghenta
ocial support and long term care for older people – Ghenta
 
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECDStrengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
 
e-HealthWhitepaper
e-HealthWhitepapere-HealthWhitepaper
e-HealthWhitepaper
 
Trigger.eu: Cocteau game for policy making - introduction and demo
Trigger.eu: Cocteau game for policy making - introduction and demoTrigger.eu: Cocteau game for policy making - introduction and demo
Trigger.eu: Cocteau game for policy making - introduction and demo
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
wipo_ip_dar_13_d_radauer.pdf
wipo_ip_dar_13_d_radauer.pdfwipo_ip_dar_13_d_radauer.pdf
wipo_ip_dar_13_d_radauer.pdf
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] ��協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
 

Recently uploaded

Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
ankitamarik05
 
Building Digital Products & Content Leadership
Building Digital Products & Content LeadershipBuilding Digital Products & Content Leadership
Building Digital Products & Content Leadership
Rajesh Math
 
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITYTEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
AaSs197122
 
stackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jesterstackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jester
NETWAYS
 
2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx
Dale Wells
 
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC WorkshopWorkshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
saastr
 
Effective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedinEffective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedin
DivyaMehta193660
 
HERO.pdf hero company working cap management project
HERO.pdf hero company working cap management projectHERO.pdf hero company working cap management project
HERO.pdf hero company working cap management project
SambalpurTokaSatyaji
 
A study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD methodA study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD method
Dr. Chihiro
 
Pengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anakPengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anak
DeviDamayanti53
 
At the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentationAt the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentation
Vanda Pokecz
 
Destyney Duhon personal brand exploration
Destyney Duhon personal brand explorationDestyney Duhon personal brand exploration
Destyney Duhon personal brand exploration
minxxmaree
 
calcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptxcalcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptx
Skmch
 
Recruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitmentRecruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitment
Rashi427200
 
Risks & Business Risks Reduce - investment.pdf
Risks & Business Risks Reduce  - investment.pdfRisks & Business Risks Reduce  - investment.pdf
Risks & Business Risks Reduce - investment.pdf
Home
 
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
NETWAYS
 
Call India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.pptCall India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.ppt
Best International calling app on the market
 
the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2
Rashi427200
 
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
NETWAYS
 
Biography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdfBiography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdf
AbdulSadickZutah
 

Recently uploaded (20)

Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
 
Building Digital Products & Content Leadership
Building Digital Products & Content LeadershipBuilding Digital Products & Content Leadership
Building Digital Products & Content Leadership
 
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITYTEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
 
stackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jesterstackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jester
 
2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx
 
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC WorkshopWorkshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
 
Effective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedinEffective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedin
 
HERO.pdf hero company working cap management project
HERO.pdf hero company working cap management projectHERO.pdf hero company working cap management project
HERO.pdf hero company working cap management project
 
A study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD methodA study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD method
 
Pengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anakPengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anak
 
At the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentationAt the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentation
 
Destyney Duhon personal brand exploration
Destyney Duhon personal brand explorationDestyney Duhon personal brand exploration
Destyney Duhon personal brand exploration
 
calcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptxcalcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptx
 
Recruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitmentRecruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitment
 
Risks & Business Risks Reduce - investment.pdf
Risks & Business Risks Reduce  - investment.pdfRisks & Business Risks Reduce  - investment.pdf
Risks & Business Risks Reduce - investment.pdf
 
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
 
Call India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.pptCall India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.ppt
 
the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2
 
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
 
Biography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdfBiography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdf
 

[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" International Panel Discussion (3) by Lorenzo Pupillo

  • 1. Coordinated Vulnerability Disclosure Policies in the EU Code Blue Security Conference, Tokyo 27-28 October 2022 Lorenzo Pupillo, Associate Senior Research Fellow and Head of the Cybersecurity@CEPS Inititiative, CEPS, Brussels
  • 2. ENISA Study 2021 ENISA: Project Officers • Marnix Dekker • Evangelos Kantas • Slawomir Bryska CEPS: Research Team • Lorenzo Pupillo • Carolina Polito • Francesco Campoli Wavestone Research Team • Nick Conway • Aude Thirriot • Thiago Barbizan • Solène Drugeot • Cristian Michael Tracci
  • 3. Agenda Current state of play of CVD policies • State of play in the EU Member States • State of play in non-EU countries Key findings on CVD national policies • Level of criticality of the vulnerability treatment and CVD processes • Good practices on CVD policy and elements of a CVD process Overview of challenges and issues on CVD national policies • Challenges and issues related to CVD policies • Suggestions on how to overcome CVD policy challenges shared by interviewees
  • 4. CURRENT STATE OF PLAY OF CVD POLICIES
  • 5. State of play in the EU Member States (1/3) While evolving in a fragmented EU environment, multiple EU Member States are making steps forward in the development of national CVD policies but at different paces. • Belgium, France, Lithuania, and the Netherlands have implemented CVD policies. • 4 Member States are on the point of implementing a policy: the proposal is either being examined at the level of policymakers or is currently tested in Pilot Projects.
  • 6. State of play in the EU Member States (2/3) • 10 Member States are in the process of implementing a national CVD policy. However, failure in reaching consensus at the political or legislative level hampered such a process. • Finally, 9 Member States has not implemented a CVD policy and the process for establishing one has not yet started.
  • 7. State of play in the EU Member States (3/3) While evolving in a fragmented EU environment, multiple EU Member States are making steps forward in the development of national CVD policies but at different paces. Implementation of CVD policy at national level in Europe
  • 8. KEY FINDINGS ON CVD NATIONAL POLICIES
  • 9. Level of criticality of the vulnerability treatment LIFECYCLE and CVD processes • Discovery: to reduce a vulnerability’s harmfulness, someone has to discover it in the first place. • Handling: If the vulnerability is in a product’s code (code vulnerability), the ‘code owner’ needs to develop mitigation and distribute it to all users (‘vulnerability handling’). • Management: if the vulnerability is a misconfiguration or unapplied mitigation (often a patch) in an information system (system vulnerability), the ‘system owner’ needs to manage it, i.e., apply the patch or change the system or product configuration as soon as possible. • Disclosure: In most cases, code vulnerability information needs to be disclosed publicly or at least to the security community or targeted audiences 9
  • 10. GOOD PRACTICES ON CVD POLICY AND ELEMENTS OF A CVD PROCESS Content of a CVD Policy • The CVD policy shall contain a description of the mutual obligations of the involved parties, namely: • Authorization to Access the Computer System (Proportionality) • Information required to report a vulnerability • Confidentiality • Procedural deadlines (within 90 days) • Communication channels • Reward to Security researchers • Public disclosure
  • 11. GOOD PRACTICES ON CVD POLICY AND ELEMENTS OF A CVD PROCESS Member States have highlighted a series of procedures they have implemented that should be regarded as best practices: • References to two standards: ISO/IEC 2914741 (disclosing vulnerability) and ISO/IEC 3011142 (processing procedures for the reported vulnerability • Bottom-up Approach (The Netherlands) • Talk to the vendors • Familiarise with the ethical hackers community • Insulate the information • Implement the OECD’s recommendations/good practices • Adopt the Common Security Advisory Framework
  • 12. ZOOMING on SOME Elements of CVD processes • Entities involved: role of the national CERT and/or the National Cybersecurity Authority: (observer or central role ) • Tools: dedicated website, implementation of ticketing systems, custom tools (Cuckoo Sandbox), validation tools (Burp suite), warning and information systems (Common Security Advisory Framework), communication tools especially in multiparty processes, find vulnerabilities through opensource intelligence software • Awareness raising campaigns: Lithuania: Cybersec Breakfast; The Netherlands: Hack right • Operational and crisis management activities
  • 13. OVERVIEW OF CHALLENGES AND ISSUES ON CVDNATIONAL POLICIES
  • 14. CHALLENGES AND ISSUES RELATED TO CVD POLICIES Overview of the challenges
  • 15. LEGAL CHALLENGES • Criminal law: According to the Cybercrime Convention, intentionally accessing a computer system without rights is a criminal offence. • Copyright law: Researchers can breach copyright law when the information disclosed entails portions of copyrighted code. The vulnerability owners can establish exemptions, enabling the possibility of safe harbours • Data protection law: Researchers, discovering vulnerabilities may access personal data which could be interpreted as a breach of data protection law. • Contract Law: Bug bounty policies and in some cases vulnerability disclosure policies represent the terms of a contract between the vulnerability owner and the researcher. Breaching the terms of the contract entails legal liability and risks for the researcher, • Export control legislation and regulation are often cited as a legal risk for researchers as they may apply to tools and knowledge used to discover vulnerabilities
  • 16. Other CHALLENGES Economic Challenges Political challenges • Vulnerabilities and software market dynamics • Lack of cooperation among stakeholders • Limited market incentives for security researchers to participate in CVD programs • Most security researchers are activists not professionals employed by private companies • Lack of resources and skills to implement CVD polices • Cost of implementation and operation of CVD policies are considered as relatively less impactful • Top Down or Bottom-up Approach • The role of Government • Updating imperfect cybercrime and Intellectual Property frameworks • Support and enable CVD policies • Leading by example in establishing CVD policies (adapting CVD within the government, etc..) • The role of the private sector • Leader or follower?
  • 17. Overcome the challenges Overcome the Legal Challenges • Two questions relating to the link of vulnerabilities discovery and criminal offence: • Circumstances under which finding vulnerabilities may be associated with criminal offense (substantial). • Conditions to be met for any crimes associated with finding vulnerabilities to be prosecuted (procedural). • Since according to the Budapest Convention only the ‘unauthorised access should be considered as criminal offence’, computer system owners can authorise access through the publication of a CVD policy; EU countries could implement CVD policies that will offer a limited liability waiver to security researchers. • Since Criminal Law is a prerogative of Member States , they could amend their criminal law to create the legal certainty for security researchers. • The EU could amend the 2013/40/EU Cybercrime Directive to offer legal certainty to security researchers. • The protection of security researchers could also be achieved by recognising the status of whistle-blower in the sense of Directive 2019/1937. • It would be helpful to define the role of ethical hackers: a law could be drafted defining ad-hoc criteria.
  • 18. Overcome the challenges • Overcome the economic challenges • Promote appropriate policies aimed at encouraging security researchers to actively participate in CVD programmes • Specific role for bug bounty programmes: should the EU set up a program or rather harmonise regulation an practices across the EU Member States? • Support to research programmes to foster CVD policies among public and private researchers in Europe (Digital Europe Programme and Horizon Europe) • The EU should make available funding and programmes to train people and make viable the development of CVD policies in the EU • Overcome the political challenges • Top Down or Bottom-up Approach: An EU approach could take the form of a common model of CVD at the EU level, promoting coordination at the EU and international level. • The role of Government: • Updating cybercrime and intellectual property frameworks to better protect security researchers, for example through ‘safe harbours’, • Leading by example in the establishment of a CVD policy (e.g., CVD within the government, etc.) • The role of the private sector: • Private entities should not wait for government policy interventions and define CVD polices to publish on the organisation’s website.
  • 19. CVD in NIS 2 • The Directive also establishes a framework for Coordinated Vulnerability Disclosure and requires Member States to designate CSIRTs to act as trusted intermediaries and facilitate the interaction between the reporting entities and the manufacturers or providers of ICT products and ICT services. ENISA is required to develop and maintain a European vulnerability registry for the discovered vulnerabilities.
  • 21. 1 Place du Congres, 1000 Brussels Tel: (+32 2)229 39 11 info@ceps.eu Thank You! @CEPS_ThinkTank