
Martin Hořický
Although cyber protection is the responsibility of each individual company, it is necessary to ensure its functioning in the event of a sudden event from the point of view of the entire economy. A well-targeted attack can disable a company for months and cause tens of millions of crowns in damage.
As cyber incidents can fundamentally threaten key infrastructure, the EU at European level, and hence the National Cyber and Information Security Authority (NCIS), is legislating on cyber security.
The impact of a cyber incident on organisations can be significant, ranging from reputational damage to operational and/or financial losses. So the message is: be vigilant and gain resilience. Organisations should focus not only on the technical aspects of information security, but also on physical security, operational resilience and overarching elements such as governance, risk management and compliance.
We will help you build information security in your organization from the ground up, starting with complete preparation and ending with final implementation. If you already have some parts implemented we will perform a complete audit in individual areas e.g. ISMS or compliance with the ZKB. At the same time, we also provide consulting services in sub-parts, such as the design of risk management methodologies, the establishment of security policies or the creation of security documentation.
While cyber protection is the responsibility of each individual company, the entire economy needs to ensure that it works even in the event of an emergency. A well-targeted attack can disable a company for months and cause tens of millions of crowns in damage.
As cyber incidents can fundamentally threaten key infrastructure, the EU at European level, and hence the National Cyber and Information Security Authority (NCIS), is legislating on cyber security.
At a time of growing digital dependence and increasing cyber threats, the European Union revised the Network and Information Security Directive, giving rise to the directive NIS2.
This Directive, which will become part of national legislation across the European Union by October 2024 at the latest, brings new rules and requirements for companies and organisations.
The NIS2 regulation was created as the European Union's response to the deepening digitalisation of society and the associated growing cyber threats in the European space. It builds on the existing Network and Information Security (NIS) framework, which was adopted in 2016.
NIS2 significantly expands the scope of the current legislation and presents a new solution to strengthen and secure European cyberspace.
The Czech Republic has a distinct advantage over some Member States as it has implemented and well-developed the Cyber Security Act (CSA).
The purpose of the Act on Cyber Security (ZKB) No. 181/2014 Coll. is mainly to increase the security of cyberspace and the state's efforts to protect that part of the infrastructure whose disruption would lead to damage or threat to the interests of the Czech Republic.
The changes introduced by the NIS2 Directive are substantial and will have an impact on companies that have not been subject to the existing regulations. Therefore, the NCIS has taken on this task by preparing a completely new law on cyber security and its decrees, which should be approved in 2024.
Cyberspace has no borders, so Australia is also affected by the rapidly changing environment. Organisations need to be able to respond flexibly to existing threats and new vulnerabilities to defend against increasingly sophisticated methods of attackers. The Australian Government has therefore responded and developed the CPS 231 and CPS 234 standards.
CPS is an Australian standard designed and implemented by the Australian Prudential Regulation Authority (APRA). The purpose of CPS is to ensure that regulated entities have sufficient information security protections implemented. Regulated entities include, in particular, the banking and insurance sectors. These requirements only apply to Australian branches.
From 1 July 2020, third parties who handle regulated entities' information assets are required to comply with the CPS standard. The CPS is used to understand the sensitivity and criticality of information assets, incident management and establish security policies, among other things. By complying with the CPS, your organization will be able to objectively measure improvements in its cybersecurity posture.
BDO provides companies with the ability to ensure compliance with Australian CPS standards either from the outset or to lose or consult on existing established practices. We will first review your documentation in detail and then commence verification work. Our output is a comprehensive CPS report that includes compliance sections according to the CPS standards. If you do not have the necessary documentation to verify the CPS standard, we can provide consultancy to create it in the pre-assessment phase.