Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2024 | 11 | 1 | 21-38

Article title

Changes Introduced by the NIS Directive 2.0 and their Potential Effect on Shaping the Cybersecurity Labour Market

Content

Title variants

Languages of publication

Abstracts

EN
Ensuring cybersecurity is – next to AI development – one of humanity’s greatest challenges nowadays. This is not a hyperbole – cybersecurity threats are real for public and private sectors, as well as individuals. With the rapid technological advancements and galloping digitisation, malicious entities and individuals are looking to take advantage of the online security gaps created by lack of caution. The European Union tried to counteract this by extensively discussing the issue, giving rise to the NIS directive. After a few years in force, its effects were assessed, and several changes were prepared to improve overall cybersecurity. However, these solutions will not work unless it becomes standard practice to employ cybersecurity specialists in a wide range of environments, extending far beyond those of the biggest organisations. This is what happened in the case of the General Data Protection Regulation (GDPR). The original provisions had been expanded to such an extent that they led to the emergence (separation) of an independent consultancy market in the field of information protection, with particular emphasis on personal data from the technical and legal consultancy markets. Hence, comparisons to the GDPR are valid. In this article, the authors review and assess the changes in cybersecurity legislation. This includes the NIS 2.0 directive category of digital service providers and their expected effects on the labour market.

Keywords

Year

Volume

11

Issue

1

Pages

21-38

Physical description

Dates

published
2024

Contributors

  • Warsaw University of Technology
  • War Studies University

References

  • Cybersecurity Threats Fast-Forward 2030: Fasten your Security-Belt Before the Ride!, https://www.enisa.europa.eu/news/cybersecurity-threats-fast-forward-2030 [access: 2.05.2023].
  • Lucini V., The ever-increasing cybersecurity compliance in Europe: The NIS 2 and what all businesses in the EU should be aware of, „Russian Law Journal” 2023, vol. 11, no. 6.
  • Mahendru P., The State of Ransomware in Retail 2022, https://news.sophos.com/en-us/2022/09/07/the-state-of-ransomware-in-retail-2022/ [access: 15.12.2023].
  • Official Cybersecurity Jobs Report, 2022, https://www.esentire.com/resources/library/2023-official-cybersecurity-jobs-report [access: 15.06.2023].
  • Pasławski K., Cyberwojna wokół Ukrainy. Nowe dane, 2022, https://crn.pl/aktualnosci/wojna-na-ukrainie-cyberwojna-wokol-ukrainy-nowe-dane/ [access: 15.12.2023].
  • Porzeżyński M., Cyberbezpieczeństwo dostawców usług cyfrowych, Warszawa 2021.
  • Report: Barometr cyberbezpieczeństwa. COVID-19 przyspiesza cyfryzację firm – marzec 2021, https://kpmg.com/pl/pl/home/insights/2021/04/raport-barometr-cyberbezpieczenstwa-2020-covid-19-przyspiesza-cyfryzacje-firm.html [access: 15.06.2023].
  • Ustawa o krajowym systemie cyberbezpieczeństwa. Komentarz, eds. W. Kitler, J. Taczkowska-Olszewska, F. Radoniewicz, Warszawa 2019.
  • Wpływ skutków pandemii koronawirusa na potrzeby kompetencyjne sektorów informatyki oraz telekomunikacji i cyberbezpieczeństwa w konsekwencji rozwoju zastosowań technologii cyfrowych oraz kształtowania się nowego modelu pracy – kwiecień 2023, https://antal.pl/wiedza/raport/wplyw-skutkow-pandemii-koronawirusa-na-potrzeby-kompetencyjne-sektorow-informatyki-oraz-telekomunikacji-i-cyberbezpieczenstwa [access: 15.06.2023].
  • Zalcewicz A. New Technologies in the Control of Public Finances and Building Public Confidence in the State, „Bialystok Legal Studies” 2023, vol. 28, no. 2.

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
31341973

YADDA identifier

bwmeta1.element.ojs-doi-10_35467_cal_187254
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.