On 20th of August 2019, at the Marriott hotel in Bucharest, CERT-RO has organized the final conference of the project “Enhanced National Cyber Security Services and Capabilities for Interoperability – eCSI” The event has brought together approximately 80 representatives from the public and private sectors, interested in the issue of cyber security.
The eCSI project, 75% co-financed through the CEF Telecom Program, aims to extend the operational capabilities of CERT-RO, as well as the cyber security services offered at national level, allowing CERT-RO to be interconnected with the EU cooperation mechanisms. The services will be compliant with the requirements stipulated in EU Directive 2016/1148 “NIS DIRECTIVE”, transposed by national Law 362/2018 “Regarding a high common level of security of networks and information systems”.
In the opening remarks, Mr. Ionuț-Valeriu Andrei, State Secretary of Ministry of Communications and Information Society, has outlined the importance of the project for the Ministry of Communications from the perspective of the services developed by CERT-RO, as well as from the perspective of implementing the NIS Directive.
Mr. Cătălin Aramă, General Manager of CERT-RO, has pointed out the importance of cooperation in cyber security, the role of the Europe Interconnection Mechanism and the role of the NIS Directive in ensuring a safe cyber security climate. It has been also presented the unique emergency number for Cyber Security issues, 1911, and the statistics resulting from the reported calls.
The conference has highlighted the final results of the eCSI project and the methods for interconnection with the National Cyber Security Platform, developed within the NCSP platform, in the context of implementing the concepts and mechanisms of the NIS Directive.
Also, the platform for information exchange on cyber security incidents (MISP) has been presented, exemplifying the working methods and mechanisms for interconnection.
CERT-RO representatives have answered questions asked by the participants and the conclusions will be helpful to improve the responsiveness to the malicious activities in cyber space.