Become member of a unique
    pan-european cyber security

    IN EU

About ECSO

The European Cyber Security Organisation (ECSO) ASBL is a fully self-financed non-for-profit organisation under the Belgian law, established in June 2016.

ECSO represents the contractual counterpart to the European Commission for the implementation of the Cyber Security contractual Public-Private Partnership (cPPP). ECSO members include a wide variety of stakeholders such as large companies, SMEs and Start-ups, research centres, universities, end-users, operators, clusters and association as well as European Member State’s local, regional and national administrations, countries part of the European Economic Area (EEA) and the European Free Trade Association (EFTA) and H2020 associated countries...

 Learn More

In Focus

Members' Corner


CYBERSEC Brussels Leaders' Foresight 2019 - Key takeaways

The 2nd CYBERSEC Brussels Leaders’ Foresight 2019, gathering cyber security policy makers and high-level private sector representatives, took place on 22 February 2019, in Brussels, Belgium. The 'Key Takeaways' provides a summary of the most important cyber security recommendations discussed during the conference. 

Full text can be downloaded from HERE


White Paper on cyber security in the Basque Country

The White Paper provides an overview of the general Basque cyber security ecosystem and presents an analysis of the cyber security sector, including prospects and opportunities for the sector, as well as the current situation of cyber security organisations operating in the Basque Country. 

The publication is available HERE


IoT Regulation is coming, and cybersecurity will be the key focus

Our member APPLUS+ Laboratories published a blog post, discussing the advent of the IoT era and what risks and security issues it brings to a world where everything is connected. It is argued that most of these problems are not new (e.g. DDoS attacks have been always there) but they get to be magnified thanks to the number of IoT devices can be found outside. By incorporating all kinds of IoT devices, the attack surface of any system becomes larger, and the existence of weak links more prone to be exposed and identified.

The full blog post can be accessed HERE


Strengthening the EU’s Cyber Defence Capabilities

Centre for European Policy Studies (CEPS) has published a report on Europe's cyber defence capabilities, titled Strengthening the EU’s Cyber Defence Capabilities, The CEPS Task Force identified a clear EU-wide interest for greater coordination and cooperation in this space. After a comparative analysis of alternative scenarios, the Task Force concluded in favour of creating an EU Cyber Defence Agency with executive competencies and therefore, the ability to develop and utilise strategic and operational capabilities at the EU level. This would mark a critical step towards a more effective and collaborative approach to enhancing cyber security and resilience in the EU. 

The full report can be accessed HERE.


Cyber Threat CEE Region 2018

CYBERSEC HUB platform and Instytut Kosciuszko (Poland) have published a report, titled Cyber Threat CEE Region 2018. The report analyses the cyber security preparedness of SMEs from The fullCEE region (Czechia, Poland, Romania, Hungary and Slovakia).

According to the main findings, 65% of companies in the region do not have any cyber security strategy in place, only half of them make regular data back-ups, and almost 60% still rely primarily on classic anti-malware software.

The first report can be downloaded from HERE


Protecting Europe against software vulnerabilities: It’s time to act!

Brussels-based Centre for European Policy Studies (CEPS) has published a major report on software vulnerability disclosure (SVD) in Europe, titled Protecting Europe against software vulnerabilities: It’s time to act!. In the report, CEPS Task Force provides recommendations and concrete policy measures to help jumpstart coordinated vulnerability disclosure and government disclosure decision processes across Europe.

According to the report, a significant barrier to the implementation of CVD policies across the EU is the lack of a single interpretation of what constitutes ‘hacking’ among the member states. It is argued that the first step is to provide the necessary legal certainty to security researchers involved in vulnerability discovery as well as to set up appropriate vulnerability disclosure processes through complementary guidance and best practices.

The full report can be purchased HERE.

The first commentary of the report can be found HERE