Links - The European Digital Identity Regulation


Proposal for a regulation amending Regulation (EU) No 910/2014 as regards establishing a framework for a European Digital Identity

Commission staff working document, Impact assessment report accompanying the Proposal for a Regulation establishing a framework for a European Digital Identity.

Regulation (EU) No 910/2014 (eIDAS - electronic IDentification, Authentication and trust Services) entered into force on 17 September 2014, and applied from 1 July 2016.

Regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market (eIDAS - electronic IDentification, Authentication and trust Services).

Our websites

a. Sectors and Industries.

1. Cyber Risk GmbH

2. Social Engineering Training

3. Healthcare Cybersecurity

4. Airline Cybersecurity

5. Railway Cybersecurity

6. Maritime Cybersecurity

7. Oil Cybersecurity

8. Electricity Cybersecurity

9. Gas Cybersecurity

10. Hydrogen Cybersecurity

11. Transport Cybersecurity

12. Transport Cybersecurity Toolkit

13. Hotel Cybersecurity

14. Sanctions Risk

15. Travel Security

b. Understanding Cybersecurity.

1. What is Disinformation?

2. What is Steganography?

3. What is Cyberbiosecurity?

4. What is Synthetic Identity Fraud?

5. What is a Romance Scam?

6. What is Cyber Espionage?

7. What is Sexspionage?

8. What is the RESTRICT Act?

c. Understanding Cybersecurity in the European Union.

1. The NIS 2 Directive

2. The European Cyber Resilience Act

3. The Digital Operational Resilience Act (DORA)

4. The Critical Entities Resilience Directive (CER)

5. The Digital Services Act (DSA)

6. The Digital Markets Act (DMA)

7. The European Health Data Space (EHDS)

8. The European Chips Act

9. The European Data Act

10. The European Data Governance Act (DGA)

11. The Artificial Intelligence Act

12. The European ePrivacy Regulation

13. The European Digital Identity Regulation

14. The European Cyber Defence Policy

15. The Strategic Compass of the European Union

16. The EU Cyber Solidarity Act

17. The EU Cyber Diplomacy Toolbox

18. The Framework for Artificial Intelligence Cybersecurity Practices (FAICP)

The exchange of information between the private and the public sector

Cyber Risk GmbH supports the national strategy for the protection of Switzerland against cyber risks (NCS), and promotes the exchange of information.

We often read that the public sector must learn from the private sector. We strongly believe that the opposite is more important. The private sector must learn from the public sector:

1. Switzerland, NDB. The Federal Intelligence Service (Nachrichtendienst des Bundes) works for the prevention of terrorism, violent extremism, espionage, proliferation of weapons of mass destruction and their delivery system technology, as well as cyberattacks against the critical infrastructure.

2. Switzerland, NCSC. The National Cybersecurity Centre (Nationale Zentrum für Cybersicherheit) is the Swiss Confederation's competence centre for cybersecurity and thus the first contact point for businesses, public administrations, educational institutions and the general public. It is responsible for the coordinated implementation of the national strategy for the protection of Switzerland against cyber-risks (NCS).

3. Switzerland, The Zurich Cantonal Police (Kantonspolizei Zürich) operates

4. Switzerland, SKP. The Swiss Crime Prevention (Schweizerische Kriminalprävention) is an agency specializing in the prevention of crime and the fear of crime.

5. Switzerland, GovCERT. The Computer Emergency Response Team of the Swiss government, the official national CERT of Switzerland.

6. Germany, BfV - The domestic intelligence service of the Federal Republic of Germany (Bundesamt für Verfassungsschutz). The Office for the Protection of the Constitution ensures that the free democratic basic order is secured at federal level and in the 16 federal states.

7. Germany, BND - The foreign intelligence service of the Federal Republic of Germany (Bundesnachrichtendienst). The BND works for the acquisition and processing of information, to inform the federal government on developments important for foreign and security policy.

8. Germany - BAMAD. The military counter-intelligence service (Bundesamt für den Militärischen Abschirmdienst) is one of the three German intelligence services at federal level, and works for the protection of the constitution. The Military Counterintelligence Service Report is highly recommended (

9. Canada - CSIS. The Canadian Security Intelligence Service investigates activities suspected of constituting threats to the security of Canada, and reports to the Government of Canada. They take measures to reduce threats to the security of Canada.

10. UK - MI5. For more than a century, MI5 protects the UK from a range of threats, whether it be from terrorism or hostile activity by states.

11. UK - MI6. They have three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

12. UK - GCHQ. With priorities set by the UK’s National Security Strategy and the decisions of the National Security Council, chaired by the Prime Minister, as well as the Joint Intelligence Committee.

13. UK - NCA. The National Crime Agency houses the UK’s International Crime Bureaux including INTERPOL and EUROPOL. They manage the routine exchange of police and law enforcement information through these channels and provide access to international databases and capabilities.

14. US - ODNI. The Office of the Director of National Intelligence serves as the head of the U.S. Intelligence Community, overseeing and directing the implementation of the National Intelligence Program and acting as the principal advisor to the President, the National Security Council, and the Homeland Security Council for intelligence matters related to national security.

15. US - CIA. The Central Intelligence Agency provides intelligence on foreign countries and global issues to the president, the National Security Council, and other policymakers to help them make national security decisions.

16. US - NSA. The National Security Agency leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) insights and cybersecurity products and services.

17. US - FBI. The Federal Bureau of Investigation protect the U.S. from terrorist attacks, against foreign intelligence, espionage, and cyber operations. FBI combats significant cyber criminal activity.

18. Australia, ASIO. The Australian Security Intelligence Organisation protects Australia and its people from acts of foreign interference, attacks on Australia’s defence systems, espionage, politically motivated violence including terrorism, promotion of communal violence, sabotage, and serious threats to Australia’s border integrity.

19. Australia, ONI. The Office of National Intelligence, following the passage of the Office of National Intelligence Act (2018), came into being on 20 December 2018. Represents a key component in the formation of Australia’s new National Intelligence Community (NIC), and is responsible for enterprise level management of the NIC, ensuring a single point of accountability to the Prime Minister and National Security Committee of Cabinet.

20. Australia, ASIS. The Australian Secret Intelligence Service is Australia's foreign intelligence collection agency. They collect and distribute secret foreign intelligence, information which would be otherwise unavailable to Australia, to protect Australia and its interests.