Notre revue
de presse

Date :
𝗘𝗜𝗢𝗣𝗔'𝘀 𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝗶𝗰 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲 𝘁𝗼 𝗦𝘆𝘀𝘁𝗲𝗺𝗶𝗰 𝗖𝘆𝗯𝗲𝗿 𝗧𝗵𝗿𝗲𝗮𝘁𝘀
The strategy employs four interlocking pillars to build a multi-layered defense. It is anchored in enhancing foundational digital operational resilience across the financial market through collaboration with other European Supervisory Authorities and crucial oversight of critical third-party service providers. This internal strengthening is complemented by a public-facing initiative to close the significant cyber protection gap, promoting informed decision-making to encourage mitigation and adaptation actions among businesses and citizens. To sustain these efforts amid rapid digitalization, EIOPA mandates the continuous adaptation of supervisory frameworks, leveraging SupTech and enhanced data sharing to detect vulnerabilities and structural shifts more efficiently. These pillars are unified through fostering collaborative risk management, working with other relevant EU and international authorities to enable a coordinated response.
Date :
The outlook frames the cyber risk landscape as shaped by AI-driven threats, geopolitical instability, and widespread cyber-enabled fraud. It notes an AI arms race amplifying vulnerabilities, a fragmented global order increasing state-sponsored threats, and pervasive phishing affecting personal and professional networks. The report highlights a strategic disconnect between CEOs prioritizing financial impacts and CISOs focused on operational risks. It identifies widening “cyber inequity,” with public sector and NGO organizations less resilient due to skill shortages and funding gaps. Overall, the outlook emphasizes that cyber resilience depends on collective action, collaboration, and intelligence sharing.
Date :
The document describes an approach to regulatory adaptation that emphasizes flexible, risk-based supervision in response to digital and technological change. It presents Risk-Based Supervision as a framework intended to identify emerging risks beyond existing legislation through systematic risk identification. The discussion outlines a dual-level process combining industry-wide analysis of technological trends with firm-level assessments of IT systems and operational resilience. It further notes that identified risks are evaluated for potential impact, highlighting cybersecurity as an example that may involve cross-regulatory coordination and could threaten critical operations if severe.