{"id":89687,"date":"2019-07-30T09:00:00","date_gmt":"2019-07-30T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89687"},"modified":"2023-05-16T13:53:40","modified_gmt":"2023-05-16T20:53:40","slug":"eu-law-enforcement-protocol-improves-cross-border-cooperation","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/07\/30\/eu-law-enforcement-protocol-improves-cross-border-cooperation\/","title":{"rendered":"Council of EU Law Enforcement Protocol improves cross-border cooperation"},"content":{"rendered":"
Last March, the Council of the European Union announced the new EU Law Enforcement Emergency Response Protocol<\/a> to address the growing problem of planning and coordinating between governments, agencies, and companies when cyberattacks occur across international boundaries. Remember well-known incidents such as NotPetya and WannaCry? They\u2019re good examples of how cyberattacks can simultaneously impact organizations and other entities in two or more countries. This especially applies to multinational corporations since they have footprints in multiple jurisdictions.<\/p>\n In reading through the Protocol, a few key items are worth noting:<\/p>\n The improvements to the EU Law Enforcement Emergency Response Protocol are invaluable. By streamlining and strengthening their cross-border approaches, protocols, and ways of communicating, efforts to thwart attacks can begin immediately and proceed more effectively.<\/p>\n Preserving electronic evidence makes finding and punishing the perpetrators a priority. However, work still must be done on developing plans and protocols to mitigate damage to OT systems, and I hope they prioritize this focus for their next iteration.<\/p>\n The new EU Law Enforcement Emergency Response Protocol addresses the growing problem of planning and coordinating between governments, agencies, and companies when cyberattacks occur across international boundaries.<\/p>\n","protected":false},"author":96,"featured_media":89689,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3668,3669,3674,3675],"products":[3702,3703],"threat-intelligence":[],"tags":[],"coauthors":[1896],"class_list":["post-89687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-compliance","topic-data-protection","topic-incident-response","topic-information-protection-and-governance","products-microsoft-entra","products-microsoft-entra-id"],"yoast_head":"\n\n
Learn more<\/h3>\n
\n