{"id":24663,"date":"2019-01-25T14:52:10","date_gmt":"2019-01-25T14:52:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/"},"modified":"2019-01-25T14:52:10","modified_gmt":"2019-01-25T14:52:10","slug":"uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/","title":{"rendered":"UK-EU infosec data sharing may not be KO&#8217;d by Brexit, reckons ENISA bod"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/09\/15\/eu_flag_photo_via_shutterstock.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><strong class=\"trailer\">Interview<\/strong> A senior EU cybersecurity official has said he is \u201coptimistic\u201d about information sharing between the UK and the political bloc continuing after Brexit.<\/p>\n<p>In an interview with <em>The Register<\/em>, Steve Purser of the EU agency for Network and Information Security (ENISA) said that while it is \u201cobvious\u201d that the information-sharing relationship \u201cwill be changed\u2026 if the Brexit goes about\u201d, he is keeping an open mind.<\/p>\n<p>This could be seen as a contrast to the <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/news.sky.com\/story\/national-security-will-be-severely-weakened-in-no-deal-brexit-former-security-chiefs-11616825\">decidedly gloomy view<\/a> being promoted today by a slack handful of retired defence and security bigwigs.<\/p>\n<p>\u201cENISA and the [EU] Commission doesn\u2019t just do things within our boundaries,\u201d he said at France\u2019s FIC2019 infosec shindig earlier this week. \u201cMy guess would be that [being] within the Union would give the best information sharing relationship. Having said that, we are looking for global approaches and we will make the best deal out of a bad situation.\u201d<\/p>\n<p>ENISA is a relatively small agency based on the Greek island of Crete. Employing 83 people at present, its ambition is to grow to \u201caround 140\u201d heads \u2013 and, presumably, expand its annual budget of just 11m euros. Following new EU cybersecurity directives in 2017, Purser told us, ENISA secured \u201ca permanent mandate and [many] more responsibilites.\u201d<\/p>\n<p>\u201cThe most interesting thing about it from my point of view is that we get a very big new responsibility which is to set up an EU cybersecurity certification framework. This is a framework that will allow certifying authorities to certify everything from lightbulbs, toasters to atomic stations and submarines. And processes and services,\u201d he added. This \u201cvoluntary\u201d scheme would, in his vision, ultimately allow the general public to \u201cunderstand and interpret\u201d the security capabilities of consumer goods and \u201cinfluence their purchasing decisions.\u201d<\/p>\n<h3>A shop-of-shops<\/h3>\n<p>ENISA functions by \u201cleveraging the expertise of the [EU] member states\u201d, said Purser. Rather than doing all its own work in-house, it aims to bring together \u201ca community of experts\u201d to work on problems and exercises. Though this seems like a very limited role, when we put this to Purser he emphasised how \u201cscalable\u201d ENISA\u2019s setup is:<\/p>\n<p>\u201cBy working like this, the ownership of the solution is with the community. That\u2019s a powerful model because it\u2019s then their solution and not ENISA\u2019s solution. We do not pretend to be those that can save the world but by working together [with the EU] member states, together we can do an extremely good job.\u201d<\/p>\n<p>Surely, <em>El Reg<\/em> asked, it\u2019s not all as smooth as that, and the EU\u2019s traditionally top-down approach doesn\u2019t really gel with the realities of frontline infosec? Purser, bespectacled and slightly flush from the powerful heating in Lille\u2019s Grand Palais conference centre, nodded. \u201cWhen we started out, we did terribly.\u201d<\/p>\n<p>Referring to a 2010 exercise that was a &#8220;failure&#8221;, Purser said that \u201cwas the best possible thing that could have happened. Ever since then we\u2019ve been doing exercises every two years and now have a very sophisticated setup. We have SOPs defined across borders\u2026 incidentally, they were used for Wannacry and Notpetya, so we had a better response than we would have done otherwise.\u201d<\/p>\n<p>In light of that failure, he said ENISA has three main objectives regarding incident response terms: identifying who to call; understanding that person\u2019s \u201cdecision making powers and capabilities\u201d; and exchanging, in a secure way, the right information to solve the problem.<\/p>\n<p>\u201cA lot of what ENISA does is bottom up,\u201d he emphasised. \u201cWe get the experience on why some things worked well and others don\u2019t, and we feed back into the policy loop.\u201d<\/p>\n<h3>Don\u2019t worry, be happy \u2026 oh, er, about that<\/h3>\n<p>In terms of what badness he sees coming our way this year, Purser was explicit: ENISA thinks black hats are getting more sophisticated and more geared towards hacking for profit rather than notoriety.<\/p>\n<p>\u201cWe see, to a certain extent, a move towards hardware,\u201d he said. \u201cSpectre and Meltdown, the Rocker vuln, some evidence that things may be moving lower down in the stack to some extent.\u201d<\/p>\n<p>\u201cMonetisation, for sure,\u201d he continued. \u201cPeople used to hack for reputation, now it\u2019s about money. There are industrial level processes and quality systems supporting some attacks. We see people understanding the weaknesses of new technologies \u2013 but, of course, when new things come out like AI or robotics we can be ready for a whole new wave of attacks.\u201d<\/p>\n<p>Moreover, things are not going to get safer any time soon. Even new technologies bring their own unique set of threats with them, Purser agreed.<\/p>\n<p>\u201cFundamental concepts are being threatened. For many years we assumed that safety and security were pretty much the same thing, whereas some things taught us that\u2019s not necessarily true. The example I give is the Eurowings crash where the pilot used a security feature to crash the plane.* As we move into the world of cyberphysical systems, we cant assume they\u2019re the same: we have to look very carefully at the two.\u201d \u00ae<\/p>\n<h3><em>Bootnote<\/em><\/h3>\n<p>* Andreas Lubitz, the Germanwings pilot who in 2015 murdered 150 people in cold blood as well as himself, waited until the aircraft captain briefly left the flight deck before locking the cockpit door shut and setting the autopilot to fly into the Alps. After the Twin Towers terrorist murders of 2001, all airliner cockpit doors were reinforced and made unopenable from the outside if locked.<\/p>\n<p>Shortly after the Alps mass murder, Germanwings rebranded as Eurowings.<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/01\/25\/enisa_steve_purser_interview\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ops director talks to El Reg about continential cybersecurity contrivances Interview\u00a0 A senior EU cybersecurity official has said he is \u201coptimistic\u201d about information sharing between the UK and the political bloc continuing after Brexit.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24664,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-24663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UK-EU infosec data sharing may not be KO&#039;d by Brexit, reckons ENISA bod 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UK-EU infosec data sharing may not be KO&#039;d by Brexit, reckons ENISA bod 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-25T14:52:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UK-EU infosec data sharing may not be KO&#8217;d by Brexit, reckons ENISA bod\",\"datePublished\":\"2019-01-25T14:52:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/\"},\"wordCount\":921,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/\",\"name\":\"UK-EU infosec data sharing may not be KO'd by Brexit, reckons ENISA bod 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg\",\"datePublished\":\"2019-01-25T14:52:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UK-EU infosec data sharing may not be KO&#8217;d by Brexit, reckons ENISA bod\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UK-EU infosec data sharing may not be KO'd by Brexit, reckons ENISA bod 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/","og_locale":"en_US","og_type":"article","og_title":"UK-EU infosec data sharing may not be KO'd by Brexit, reckons ENISA bod 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-25T14:52:10+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UK-EU infosec data sharing may not be KO&#8217;d by Brexit, reckons ENISA bod","datePublished":"2019-01-25T14:52:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/"},"wordCount":921,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/","url":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/","name":"UK-EU infosec data sharing may not be KO'd by Brexit, reckons ENISA bod 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg","datePublished":"2019-01-25T14:52:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/uk-eu-infosec-data-sharing-may-not-be-kod-by-brexit-reckons-enisa-bod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"UK-EU infosec data sharing may not be KO&#8217;d by Brexit, reckons ENISA bod"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24663"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24663\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24664"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}