{"id":7431,"date":"2024-11-04T17:54:56","date_gmt":"2024-11-04T15:54:56","guid":{"rendered":"https:\/\/heliview.com\/cyber-security-experience\/?p=7431"},"modified":"2024-11-04T18:01:52","modified_gmt":"2024-11-04T16:01:52","slug":"whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends","status":"publish","type":"post","link":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/","title":{"rendered":"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]NCC Group is proud to be a close advisor to governments and legislators globally as they make important decisions about the future of cyber rules. Utilising our deep technical expertise, we help to shape new laws and policies. We do so with the aim of creating a conducive operating environment and delivering on our purpose to create a more secure digital future. Where we operate, whether that is in the Netherlands and across Europe, the UK, the U.S., Canada, Australia, Singapore and the Philippines, our engagement with cyber security policymakers affords us unique insights into the key regulatory and legislative changes affecting us and our clients, and the commonalities and differences they need to navigate around the world. This report draws from these insights, and our wider work, covering:<\/p>\n<ul>\n<li>Our Regulation Radar looking to the laws and regulations on the horizon<\/li>\n<li>The recent policy developments you need to know<\/li>\n<li>A spotlight on data privacy<\/li>\n<\/ul>\n<p>The three things to look out for in the months ahead.[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download de whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    E\u00e9n of meerdere velden zijn niet of incorrect ingevuld.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Voornaam*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Achternaam*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Bedrijfsnaam*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Functie*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Zakelijk E-mailadres*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>Door op aanmelden te klikken geeft u toestemming om gemaild te worden, u ontvangt de whitepaper in uw mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '9bc4f11b-ba4c-4823-bb3c-d8c6fa863354')\" type=\"button\" class=\"lgx-btn\" value=\"Aanmelden\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Bedankt, je ontvangt binnen een paar minuten een e-mail om de whitepaper te downloaden.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Er is helaas iets mis gegaan; uw aanvraag is niet gelukt. Probeer het later nog eens.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsZ3gtc3Vic2NyaWJlci1hcmVhJTIyJTNFJTBBJTNDZm9ybSUyMGNsYXNzJTNEJTIybmV3c2xldHRlciUyMiUzRSUwQSUzQ2xhYmVsJTNFJTIwRS1tYWlsYWRyZXMlMjAlM0NpbnB1dCUyMHR5cGUlM0QlMjJ0ZXh0JTIyJTIwaWQlM0QlMjJFbWFpbEFkZHJlc3NOZXdzbGV0dGVyJTIyJTIwbmFtZSUzRCUyMmVtYWlsJTIyJTIwcGxhY2Vob2xkZXIlM0QlMjJVdyUyMGUtbWFpbGFkcmVzJTIyJTIwJTJGJTNFJTNDJTJGbGFiZWwlM0UlMEElM0NpbnB1dCUyMHR5cGUlM0QlMjJidXR0b24lMjIlMjBjbGFzcyUzRCUyMmxneC1idG4lMjIlMjB2YWx1ZSUzRCUyMmluc2NocmlqdmVuJTIyJTIwb25jbGljayUzRCUyMldlYnNpdGUuU3Vic2NyaWJlVG9OZXdzbGV0dGVyJTI4JTI3ODUxMjkyMjk1MjM3JTI3JTI5JTIyJTNFJTBBJTNDZGl2JTIwaWQlM0QlMjJOZXdzbGV0dGVyU3VjY2VzcyUyMiUyMGNsYXNzJTNEJTIybmlldXdzYnJpZWYtc3VjY2VzJTIwaGlkZGVuJTIyJTNFQmVkYW5rdCUyQyUyMHV3JTIwaW5zY2hyaWp2aW5nJTIwaXMlMjB2ZXJ6b25kZW4lMjElM0MlMkZkaXYlM0UlMEElM0NkaXYlMjBpZCUzRCUyMk5ld3NsZXR0ZXJFcnJvciUyMiUyMGNsYXNzJTNEJTIybmlldXdzYnJpZWYtZXJyb3IlMjBoaWRkZW4lMjIlM0VFciUyMGlzJTIwaGVsYWFzJTIwaWV0cyUyMG1pcyUyMGdlZ2FhbiUzQiUyMHV3JTIwaW5zY2hyaWp2aW5nJTIwaXMlMjBuaWV0JTIwZ2VsdWt0LiUyMFByb2JlZXIlMjBoZXQlMjBsYXRlciUyMG5vZyUyMGVlbnMuJTNDJTJGZGl2JTNFJTBBJTNDJTJGZm9ybSUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"NCC Group is proud to be a close advisor to governments and legislators globally as they make important decisions about the future of cyber rules. Utilising our deep technical expertise, we help to shape new laws and policies. We do so with the aim of creating a conducive operating environment and delivering on our purpose [...]","protected":false},"author":16,"featured_media":7435,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,1,16],"tags":[],"class_list":["post-7431","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-geen-categorie","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends<\/title>\r\n<meta name=\"description\" content=\"This report draws from these insights, and our wider work, covering:Our Regulation Radar looking to the laws and regulations on the horizon\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends\" \/>\r\n<meta property=\"og:description\" content=\"This report draws from these insights, and our wider work, covering:Our Regulation Radar looking to the laws and regulations on the horizon\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Security Experience\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-11-04T15:54:56+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-11-04T16:01:52+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"miki\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"miki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuten\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/\",\"name\":\"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png\",\"datePublished\":\"2024-11-04T15:54:56+00:00\",\"dateModified\":\"2024-11-04T16:01:52+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\"},\"description\":\"This report draws from these insights, and our wider work, covering:Our Regulation Radar looking to the laws and regulations on the horizon\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png\",\"contentUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-security-experience\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/\",\"name\":\"Cyber Security Experience\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\",\"name\":\"miki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"caption\":\"miki\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends","description":"This report draws from these insights, and our wider work, covering:Our Regulation Radar looking to the laws and regulations on the horizon","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/","og_locale":"nl_NL","og_type":"article","og_title":"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends","og_description":"This report draws from these insights, and our wider work, covering:Our Regulation Radar looking to the laws and regulations on the horizon","og_url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/","og_site_name":"Cyber Security Experience","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2024-11-04T15:54:56+00:00","article_modified_time":"2024-11-04T16:01:52+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png","type":"image\/png"}],"author":"miki","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Geschreven door":"miki","Geschatte leestijd":"2 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/","url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/","name":"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png","datePublished":"2024-11-04T15:54:56+00:00","dateModified":"2024-11-04T16:01:52+00:00","author":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d"},"description":"This report draws from these insights, and our wider work, covering:Our Regulation Radar looking to the laws and regulations on the horizon","breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#primaryimage","url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png","contentUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-global-cyber-policy-radar-report-on-cyber-security-regulation-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-security-experience\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: Global Cyber Policy Radar Report on cyber security regulation trends"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-security-experience\/#website","url":"https:\/\/heliview.com\/cyber-security-experience\/","name":"Cyber Security Experience","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Person","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d","name":"miki","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","caption":"miki"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/comments?post=7431"}],"version-history":[{"count":3,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7431\/revisions"}],"predecessor-version":[{"id":7436,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7431\/revisions\/7436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media\/7435"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media?parent=7431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/categories?post=7431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/tags?post=7431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}