{"title":"Cybersecurity Trends in the European Union: Regulatory Mercantilism and the Digitalisation of Geopolitics","authors":"Helena Carrapico, Benjamin Farrand","doi":"10.1111/jcms.13654","DOIUrl":null,"url":null,"abstract":"<p>The European Union (EU)'s cybersecurity policy has, over the past two decades, undergone dramatic changes that have positioned it not only at the forefront of the EU's security policy landscape but also as one of the most influential policies across the EU policy spectrum (Carrapico and Farrand, <span>2020</span>; Christou, <span>2015</span>; Dunn Cavelty, <span>2013</span>; Obendiek and Seidl, <span>2023</span>). Over the years, the EU has become particularly aware of its increasing reliance on digital infrastructure and services, namely, how sectors such as transport, trade, finance, health, energy and education rely on accessing secure information and communication technology infrastructure. This dependency has been understood as highlighting the EU's vulnerability to the exponential growth in cyberthreats online (Carrapico and Farrand, <span>2021</span>). Having developed mainly in a reactive fashion to these perceived vulnerabilities, the EU's cybersecurity strategy was officially introduced in 2013 as an umbrella for a set of pre-existing, albeit scattered, initiatives (European Commission and High Representative of the European Union for Foreign Affairs and Security Policy, <span>2013</span>). Since then, it has transitioned from a set of foundational measures to a mature, comprehensive and strategic policy focused on resilience, co-operation and technological advancement. It is composed of four main sub-policy areas: cybercrime and law enforcement; critical information infrastructure protection; cyber-defence; and cyber-diplomacy. Although distinct in their focus, these areas all work together towards the protection of the EU's digital infrastructure and residents.</p><p>The evolution of the EU cybersecurity policy can be characterised as having three distinct phases: the first was the genesis phase (1985–2003), during which the different sub-fields of cybersecurity developed separately (in particular in the context of the former EU First and Third Pillars), and the EU gradually positioned itself as a co-ordinating actor capable of addressing cross-border cybersecurity threats. This phase saw the initial recognition of the need for a co-ordinated approach to cybersecurity within a European framework. The second was the institutionalisation phase (2004–2018), where the EU pushed towards a more consistent policy framework by advocating for coherence and dialogue between the different sub-fields. This push involved the introduction and expansion of the number of EU cybersecurity co-ordinating bodies and adopting resilience as a strategy to protect businesses, public bodies and citizens. The third phase can be classified as the regulatory phase (2019–present), which has been marked by a significant attempt by the EU to gain control of cybersecurity governance. This has been achieved through a discursive framing of cybersecurity as a matter of European sovereignty (Farrand and Carrapico, <span>2022</span>), the translation of this discourse into a substantial body of legislation (Farrand and Carrapico, <span>2022</span>; Heidebrecht, <span>2024</span>), the continued expansion of the number of EU bodies involved in this field and the introduction of international leadership ambitions in this field (Carver, <span>2023</span>). Overall, the history of EU cybersecurity policy is one of continuous expansion and systematisation, having emerged as <i>ad hoc</i> initiatives aimed at protecting the common market and, at a later stage, at furthering the EU Justice and Home Affairs agenda. Having outgrown these policy areas, EU cybersecurity is now also firmly present within the Common Foreign and Security Policy (CFSP) and beyond, making it a truly transversal policy.\n1</p><p>The present article analyses the 2023 developments in EU cybersecurity, placing them in their broader geopolitical and policy contexts. In the geopolitical context, the Commission perceives the EU as vulnerable to new threats, and their technological dimension, in a world that is increasingly polarised and unstable. In terms of policy, this has translated into the pursuit of regulatory controls aimed at creating a unified approach to cybersecurity in the Union, characterised by increased oversight and hierarchical EU governance, along with actions aimed at exporting its cybersecurity norms as international standards through cyber-diplomacy initiatives. The article proposes that developments in this field can be understood through the lens of regulatory mercantilism (Farrand and Carrapico, <span>2022</span>). This framework highlights that there has been a unification of sovereignty, security and economy discourses, in which the EU frames its own vulnerabilities to external threats as necessitating increased regulatory control and exports of its own norms and values as international standards (Farrand, <span>2023</span>). Regulatory mercantilism is characterised by a rhetorical performativity (Couture and Toupin, <span>2019</span>) that ‘contrasts the geopolitical, security and economic challenges that the EU is facing in the twenty-first century with the vision it has for its future as an integration project’ (Bellanova et al., <span>2022</span>, p. 348). In this sense, regulatory mercantilism identifies policy formation as a means of state-building in response to geopolitical concerns, which this article aims to unpack. It does so by taking the three characteristics of regulatory mercantilism and applying them to the 2023 developments in cybersecurity policy. The first section highlights the EU's growing sense of geopolitical insecurity and vulnerability as a driver of policy; the second explores those policies in more depth, identifying the increased regulatory control the EU is seeking to exert in this policy domain; and the third reflects on the attempts at norm exporting through cyber-diplomacy.</p><p>The EU's 2023 actions in the field of cybersecurity are best understood in relation to the broader policy agenda and initiatives of the EU. With the formation of the von der Leyen Commission, a discourse of ‘digital sovereignty’ became central to the EU's actions in technology governance (Bellanova et al., <span>2022</span>). The EU's digital sovereignty discourse expresses a desire for increased control as a response to a perceived sense of vulnerability to external threats posed by both non-EU states and private sector actors that may not align themselves with EU values or interests (Carrapico and Farrand, <span>2020</span>). Shaping Europe's Digital Future, the Commission's policy agenda concerned with the ‘digital pillar’ of its 2019–2024 work programme framed this sovereignty ambition in terms of developing EU capabilities and reducing external dependencies (European Commission, <span>2020b</span>, p. 3). It is closely linked to the concept of strategic autonomy (Broeders et al., <span>2023</span>). The State of the Union 2023 underscores that this European sovereignty is ‘an economic and national security imperative to preserve a European edge on critical and emerging technologies’ (von der Leyen, <span>2023</span>, p. 7), reinforcing this notion that EU security is determined by its ability to act independently of external constraints or pressures. These constraints include, namely, a lack of control over externally held or operated infrastructures, services and content providers (Madiega, <span>2020</span>) with implications for the EU's capacity to protect citizens' data and security (Celeste, <span>2021</span>; see also Chander and Sun, <span>2023</span>); a dependence upon critical natural resources possessed or processed by other states required for producing technologies needed for cybersecurity purposes (DeCarlo and Goodman, <span>2022</span>); and a perceived vulnerability to increased cyberthreats, whether in the form of disinformation, ransomware attacks, denial of service attacks or data breaches (Moerel and Timmers, <span>2021</span>).</p><p>These identified digital vulnerabilities are closely related to the EU's broader sense of its own geopolitical vulnerabilities. This has often been implied in concerns expressed over challenges to the liberal international order as a rejection of globalisation (Braw, <span>2024</span>), with increased disregard for international organisations and norms (Stephan, <span>2023</span>) and a return to ‘great power’ politics between larger states (Weiß, <span>2023</span>). In the context of these geopolitical changes, there has been a blurring of ‘cyber’ and ‘material’ security, with the EU discussing concerns over ‘hybrid’ threats in 2016 (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, <span>2016</span>), with cybersecurity being one means by which hostile actors could destabilise the EU, whether through spreading disinformation or attacking critical information infrastructures (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, <span>2016</span>, p. 10). This 2016 document was followed up in 2018 by a Communication on increasing resilience and bolstering capacities to address hybrid threats, where it was stated that ‘cybersecurity is critical to both our prosperity and security. As our daily lives and economies become increasingly dependent on digital technologies, we become more and more exposed’ (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, <span>2018</span>, p. 7).</p><p>In 2023, the Russian war on Ukraine served to highlight the EU's perceived cyber-vulnerability resulting from broader geopolitical instability, with CERT-EU\n2 monitoring the potential for Russia's actions to expand into cyber-operations against the EU's institutions. One of CERT-EU February 2023 report's key findings was that ‘cyber operations associated with Russia's war on Ukraine have not been confined to the belligerents. Since Russia's invasion, allies of Ukraine, such as EU countries, have faced several types of cyberattacks’ (CERT-EU, <span>2023</span>, p. 3). New technologies are also classified as threats, with generative artificial intelligence (AI) featuring in both the State of the Union 2023 and a report produced by CERT-EU. In the State of the Union, it is explicitly framed as a security threat, with von der Leyen citing experts claiming that preventing human extinction by AI should be prioritised in the same way as preventing nuclear war, stating that AI ‘is a general technology that is accessible, powerful and adaptable for a vast range of uses – both civilian and military. And it is moving faster than even its developers anticipated. So we have a narrowing window of opportunity to guide this new technology’ (von der Leyen, <span>2023</span>, p. 9). Similarly, CERT-EU stated that whilst generative AI could have potential cyber-defensive capabilities, they have significant concerns regarding its potential for cyber-offence, with uses including sophisticated social engineering attacks, more effective forms of phishing and automation of the identification of cybersecurity vulnerabilities allowing for the uncovering of previously unknown attack vectors (CERT-EU, <span>2023</span>, p. 4). Given the concerns regarding the security implications of increased AI use, the European Commission has made clear the desire to regulate the use of the technology internally, through mechanisms such as the AI Act,\n3 as well as seeking to guide the development of rules at the international level, both through the AI Act serving as a blueprint for the rest of the world and through guiding innovation and the implementation of minimum standards for safe and ethical use (von der Leyen, <span>2023</span>, pp. 9–10).</p><p>2023 was a particularly active year for the EU's regulatory efforts in cybersecurity. Whilst admittedly agreed upon at the end of 2022, the directive on measures for a high common level of cybersecurity across the Union (Directive 2022/2555), also known as the NIS2 Directive, entered into force in January 2023. This directive repealed the original NIS Directive and is indicative of a form of regulatory cybersecurity ‘state making’ on the part of the EU. In its public facing FAQ document, the Commission explained its decision to repeal the original directive and create new legislation on the basis that it was responding to an expanded threat landscape and needed to address ‘an insufficient level of cyber resilience of businesses operating in the EU; inconsistent resilience across Member States and sectors; insufficient common understanding of the main threats and challenges across Member States; [and a] lack of joint crisis response’ (European Commission, <span>2023a</span>). The proposal for the directive made clear the desire for increased control in this field, stating that the proposal was part of a package aimed at ‘strengthening the Union's strategic autonomy to improve its resilience and collective response’ (European Commission, <span>2020a</span>, p. 1). Interestingly, in the final text of the directive, the link to vulnerability as a basis for intervention is found in recital 37, where it is stated that ‘intensified cyberattacks during the COVID-19 pandemic have shown the vulnerability of increasingly interdependent societies’ (Directive 2022/2555). As well as updating the pre-existing requirements under NIS1 (Directive 2016/1148), NIS2 provides for stronger oversight and enforcement in order to guarantee resilience from cyberattacks (Vandezande, <span>2024</span>). Article 12 provides for co-ordinated vulnerability disclosure between member states (MSs), as well as the creation of a vulnerability database that will be maintained by European Union Agency for Cybersecurity (ENISA). Article 13 mandates co-operation at the national level between MSs, and Article 14 establishes a co-operation group ‘to support and facilitate strategic cooperation and the exchange of information among Member States’, the membership of which includes representatives of the MSs, the Commission and ENISA, with the European External Action Service acting as an observer.</p><p>2023 also saw a deepening of cybersecurity regulation in line with a regulatory mercantilist frame of heightened oversight and regulatory hierarchy, going from beyond the narrower confines of setting private sector obligations to the establishment of an all-encompassing cybersecurity framework. First, the Commission proposed modifications to the Cybersecurity Act, which had been adopted in 2019 (Regulation 2019/881) to expand its certification schemes to include managed security services. The Commission proposed this as means of raising the overall level of cybersecurity in the Union, which would facilitate the emergence of trusted cybersecurity service providers as a priority for the ‘industrial policy of the Union in the cybersecurity field’ (European Commission, <span>2023e</span>, p. 1). The establishment of a European certification system based on European standards was central to the rationale of the Cybersecurity Act (Kohler, <span>2020</span>), with the expansion of this regime to cover additional sector actors representing a deepening of this regulatory approach. The proposal, which has had its first European Parliament reading and is awaiting the Council's first reading position, states that its purpose is to support the EU Cyber Solidarity Act, which was also published in April 2023 (European Commission, <span>2023e</span>, p. 2). Interestingly, the main legal basis for the act is Article 173 TFEU, which concerns the creation of the necessary conditions for the competitiveness of the EU's industry, which aligns with the underlying regulatory mercantilist position.</p><p>The proposal for the Cyber Solidarity Act makes explicit the link to the digital sovereignty agenda, highlighting the threat posed by external actors with references to Russian aggression and cyberattacks, as well as from other state and non-state actors (European Commission, <span>2023f</span>, p. 1), strengthening solidarity through better detection of, preparation for, and responses to cybersecurity threats (European Commission, <span>2023f</span>, p. 2). We see another form of cybersecurity industrial policy being devised within this framework – the means by which these objectives are to be achieved are through the ‘deployment of pan-European infrastructure’ in the form of security operations centres, named the EU Cyber Shield; the creation of an emergency response mechanism to support MSs in preparing for and responding to cyberattacks, as well as recovering from them; and the establishment of the European cybersecurity incident review mechanism, intended to allow for the review and assessment of significant incidents, with the cybershield and emergency response mechanism being directly funded by the Digital Europe Programme (European Commission, <span>2023f</span>, p. 3). Article 1 of the proposed Cyber Solidarity Act explicitly includes in its objectives reinforcing ‘the competitive position of industry and services in the Union cross the digital economy and contribut[ing] to the Union's technological sovereignty in the area of cybersecurity’ (European Commission, <span>2023f</span>, p. 22), reinforcing the regulatory mercantilist position adopted by the Commission in this field. As of May 2024, the act has secured political agreement between the Parliament and Council and is now awaiting formal approval subject to the Council's first reading (European Commission, <span>2024</span>).</p><p>Two other measures directly focused on cybersecurity also made significant progress in 2023. The EU Cyber Resilience Act, first proposed in September 2022 (European Commission, <span>2022</span>), received political agreement in December 2023, was voted favourably by the European Parliament in March 2024 and is now awaiting the Council's first reading (European Parliament, <span>2024</span>). The purpose of the Cyber Resilience Act, which has Article 114 TFEU as its legal basis, is to ensure that hardware and software products made available in the EU are rendered cybersecure, through measures aimed at guaranteeing cybersecurity through a product's entire life cycle, as well as ensuring that consumers are given sufficient information concerning the security of products, permitting informed choices (European Commission, <span>2022</span>, p. 2). The act is framed as supporting the Shaping Europe's Digital Future agenda, allowing the EU to ‘reap all the benefits of the digital age and to strengthen its industry and innovation capacity, within safe and ethical boundaries’ (European Commission, <span>2022</span>, p. 3). This regulation will give the Commission considerable powers, under the heading of market surveillance and enforcement, including deeming products as non-compliant with the regulation and as presenting a significant cybersecurity risk based on an ENISA assessment. The Commission will then be able to adopt implementing acts applying Union-level restrictions, up to and including withdrawal from the market under Article 45 (European Commission, <span>2022</span>, p. 59). Interestingly, concerns regarding AI are reflected in the Regulation, with products containing elements classified as high-risk AI systems under the proposed AI Act deemed as falling under the scope of the Cyber Resilience Act under Article 8.</p><p>Finally, 2023 saw the formal approval of the EU Institutional Cybersecurity Regulation (Regulation 2023/2841), which was published in the Official Journal in December 2023 and entered into force in January 2024. This regulation obliges all Union entities to have their own internal cybersecurity risk-management, governance and control frameworks under Article 6, the adoption of risk-management measures under Article 8 and to have established a cybersecurity plan by January 2026 under Article 9. Article 10 establishes the Interinstitutional Cybersecurity Board, comprising a representative of each of the Union's entities, which is tasked with monitoring and oversight of compliance with the regulation under Article 11. These combined measures indicate a comprehensive deepening of the EU's cybersecurity regulatory efforts, in which the Commission has fostered a cybersecurity industrial policy, heightening oversight within a regulatory mercantilist framework. As stated by Flonk, Jachtenfuchs and Obendiek, ‘even if the EU does not strongly promote the term “digital sovereignty” directly, the volume, bindingness and orientation of its policy output are indicative of a change towards a stronger assertion of its domestic sovereignty’ (Flonk et al., <span>2024</span>, p. 23).</p><p>MSs have welcomed these different measures, which they believe to be necessary, at EU level, in order to foster a stronger common level of cybersecurity across the Union. The speed at which the proposals have received political agreement and have progressed through the legislative process, most being adopted following first reading, is indicative of the high level of consensus in this field. MSs have, however, highlighted the need to ensure coherence within this very rapidly expanding policy area and queried the effectiveness of the voluntary nature of some of the proposals (Council of the European Union, <span>2022b</span>). These are, without doubt, issues that will re-emerge as the field continues to expand.</p><p>As mentioned in the introduction, the third element of the EU's regulatory mercantilist approach to cybersecurity consists in the attempt to export its norms and values beyond its borders with the aim to promote its vision of cybersecurity, and ultimately protect itself from cyberthreats. This ambition is particularly visible in the EU cyber-strategy, which identified international leadership as one of the main priority areas of EU external action (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, <span>2020</span>). The EU hopes to achieve this leadership through seeking to define and shape international cybersecurity norms and standards, which it is disseminating through its cyber-diplomacy instruments (Latici, <span>2020</span>). The EU perceives itself as a natural leader in this field and as being uniquely placed to define and promote such standards based on its founding democratic values, respect for the rule of law and fundamental rights. Moreover, it argues that international standards are often being used by non-EU countries to advance ‘their political and ideological’ visions (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, <span>2020</span>, p. 20), which are detrimental to EU growth, prosperity and security, making EU action in this field a particularly important priority.</p><p>Although EU efforts to become a key cyber-diplomacy global actor are not new (Council of the European Union, <span>2015</span>; European External Action Service, <span>2016</span>), we have been able to observe an acceleration in translating this rhetorical ambition into new policy initiatives and diplomatic tools. In practice, this has led to an increased spillover of EU cybersecurity policy from the common market and the area of freedom, security and justice to the CFSP. The new policy initiatives include an increased presence in multilateral bodies, a considerable growth in the number of bilateral agreements the EU has signed and instruments aimed at deepening EU integration (Renard, <span>2018</span>). Amongst the latter, the 2017 EU cyber-diplomacy toolbox is particularly worthy of mention, as it introduces, for the first time, a joint diplomatic response to malicious cyber-activities (Council of the European Union, <span>2017</span>). This initiative involves, in particular, a number of CFSP objectives, such as cyber-capability building in third countries, the introduction of EU-led political and thematic dialogues with non-EU countries and the imposing of restrictive measures beyond the EU territory. The Council of the European Union (<span>2022a</span>) has repeatedly stressed the importance of the link between EU external policies, the achievement of its cybersecurity objectives and the ambition to strengthen EU digital sovereignty.</p><p>2023 developments in this field further deepened and institutionalised this trend by emphasising the need for ‘a stronger, more strategic, coherent and effective EU policy and action in global digital affairs to confirm EU engagement and leadership’ (Council of the European Union, <span>2023</span>, p. 2). More specifically, 2023 saw the EU continue to invest in four main routes to cybersecurity norm exporting: (1) increasing the coherence between cybersecurity policy and other externally facing digital policies, based on the idea that cybersecurity functions as an enabler of advancement in these other policy areas (which include, for instance, the digital promotion of human rights); (2) showing a more united front in international multilateral fora where cybersecurity standards are discussed, such as the International Telecommunication Union and the International Organisation for Standardisation, to ensure greater influence over decisions; (3) increasing the EU's presence in other multilateral organisations where internet governance is being discussed, namely, the United Nations, the World Trade Organisation and the Internet Corporation for Assigned Names and Numbers; and (4) continuing to expand and reinforce the existing network of bilateral and regional partnerships. 2023 saw the launch of the EU-Canada and the EU-Singapore digital partnerships, which prioritise cybersecurity, digital transformation and skills in EU priority areas such as semiconductors, quantum technologies and AI (European Commission, <span>2023b</span>). Where regional partnerships are concerned, 2023 witnessed the birth of the EU-Latin America and Caribbean Digital Alliance, which focus on capacity building, connectivity, innovation and digitalisation in the region (European Commission, <span>2023c</span>, <span>2023d</span>). Finally, this year also saw the proposal to develop structured dialogues directly with the private sector (Council of the European Union, <span>2023</span>). Although we have observed a considerable effort on the side of the EU to expand its capacity to export cybersecurity norms beyond its borders and to speak with one voice on the international stage, there is for the moment insufficient evidence to ascertain whether this approach is shaping third countries' stance on the topic.</p><p>2023 was not a year of grand pronouncements or radical policy shifts in the field of cybersecurity in the EU. Instead, it is a year in which the foundations that have been laid in previous years have been used to further construct a comprehensive EU cybersecurity policy agenda, which can be regarded as being represented by regulatory deepening and active attempts at norm exporting. In line with the explanatory theoretical framework presented in this article, this deepening has been underscored by an explicit securities and vulnerabilities discourse, in which action is required in order to ensure that the EU is able to mitigate against the threats posed to it by external actors and situations over which it feels it has limited control. This perception of limited control has also led the EU to develop a global norm exporting ambition, in line with regulatory mercantilism. As a response to external threats, the EU is seeking to use its regulatory capacity to develop robust standards for cybersecurity internally, which can then be exported to other states and to the international arena in the form of best standards and practices, based on self-described European values, as a means of cementing the EU's position as a global leader, promoting itself as a rule maker rather and in so doing, reducing its vulnerabilities. Through the lens of regulatory mercantilism, we see a blurring of economic and security goals, as well as cybersecurity and material security concerns, centred on the concepts of digital sovereignty and strategic autonomy. In this, EU cybersecurity policy cannot be considered niche or of interest to technical experts only – instead, it serves as a central pillar of the initiatives pursued by the EU in its desire to provide leadership to a world it perceives as presenting myriad complex threats to its continuing stability and security. Finally, given the current evolution of EU cybersecurity, we expect academic research to reflect the exponential expansion of this policy area. In particular, further research is needed to understand how this policy field is being governed, by whom and what impact the digital sovereignty discourse has had (or not) on its advancement. Furthermore, it is important to investigate the implications of the recent surge in EU regulatory cybersecurity measures, not only for the EU as an international leader in cybersecurity but also for its wider search for a more influential position on the world stage. New research in this field will, therefore, need to further examine EU cyber-diplomacy efforts and their implementation, in the context of both multilateral organisations and bilateral relations. From a legal perspective, future research may wish to consider the diverse array of legal bases used for furthering cybersecurity measures, assessing their internal coherence and fit.</p>","PeriodicalId":51369,"journal":{"name":"Jcms-Journal of Common Market Studies","volume":"62 S1","pages":"147-158"},"PeriodicalIF":3.1000,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/jcms.13654","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jcms-Journal of Common Market Studies","FirstCategoryId":"96","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/jcms.13654","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ECONOMICS","Score":null,"Total":0}
引用次数: 0
Abstract
The European Union (EU)'s cybersecurity policy has, over the past two decades, undergone dramatic changes that have positioned it not only at the forefront of the EU's security policy landscape but also as one of the most influential policies across the EU policy spectrum (Carrapico and Farrand, 2020; Christou, 2015; Dunn Cavelty, 2013; Obendiek and Seidl, 2023). Over the years, the EU has become particularly aware of its increasing reliance on digital infrastructure and services, namely, how sectors such as transport, trade, finance, health, energy and education rely on accessing secure information and communication technology infrastructure. This dependency has been understood as highlighting the EU's vulnerability to the exponential growth in cyberthreats online (Carrapico and Farrand, 2021). Having developed mainly in a reactive fashion to these perceived vulnerabilities, the EU's cybersecurity strategy was officially introduced in 2013 as an umbrella for a set of pre-existing, albeit scattered, initiatives (European Commission and High Representative of the European Union for Foreign Affairs and Security Policy, 2013). Since then, it has transitioned from a set of foundational measures to a mature, comprehensive and strategic policy focused on resilience, co-operation and technological advancement. It is composed of four main sub-policy areas: cybercrime and law enforcement; critical information infrastructure protection; cyber-defence; and cyber-diplomacy. Although distinct in their focus, these areas all work together towards the protection of the EU's digital infrastructure and residents.
The evolution of the EU cybersecurity policy can be characterised as having three distinct phases: the first was the genesis phase (1985–2003), during which the different sub-fields of cybersecurity developed separately (in particular in the context of the former EU First and Third Pillars), and the EU gradually positioned itself as a co-ordinating actor capable of addressing cross-border cybersecurity threats. This phase saw the initial recognition of the need for a co-ordinated approach to cybersecurity within a European framework. The second was the institutionalisation phase (2004–2018), where the EU pushed towards a more consistent policy framework by advocating for coherence and dialogue between the different sub-fields. This push involved the introduction and expansion of the number of EU cybersecurity co-ordinating bodies and adopting resilience as a strategy to protect businesses, public bodies and citizens. The third phase can be classified as the regulatory phase (2019–present), which has been marked by a significant attempt by the EU to gain control of cybersecurity governance. This has been achieved through a discursive framing of cybersecurity as a matter of European sovereignty (Farrand and Carrapico, 2022), the translation of this discourse into a substantial body of legislation (Farrand and Carrapico, 2022; Heidebrecht, 2024), the continued expansion of the number of EU bodies involved in this field and the introduction of international leadership ambitions in this field (Carver, 2023). Overall, the history of EU cybersecurity policy is one of continuous expansion and systematisation, having emerged as ad hoc initiatives aimed at protecting the common market and, at a later stage, at furthering the EU Justice and Home Affairs agenda. Having outgrown these policy areas, EU cybersecurity is now also firmly present within the Common Foreign and Security Policy (CFSP) and beyond, making it a truly transversal policy.
1
The present article analyses the 2023 developments in EU cybersecurity, placing them in their broader geopolitical and policy contexts. In the geopolitical context, the Commission perceives the EU as vulnerable to new threats, and their technological dimension, in a world that is increasingly polarised and unstable. In terms of policy, this has translated into the pursuit of regulatory controls aimed at creating a unified approach to cybersecurity in the Union, characterised by increased oversight and hierarchical EU governance, along with actions aimed at exporting its cybersecurity norms as international standards through cyber-diplomacy initiatives. The article proposes that developments in this field can be understood through the lens of regulatory mercantilism (Farrand and Carrapico, 2022). This framework highlights that there has been a unification of sovereignty, security and economy discourses, in which the EU frames its own vulnerabilities to external threats as necessitating increased regulatory control and exports of its own norms and values as international standards (Farrand, 2023). Regulatory mercantilism is characterised by a rhetorical performativity (Couture and Toupin, 2019) that ‘contrasts the geopolitical, security and economic challenges that the EU is facing in the twenty-first century with the vision it has for its future as an integration project’ (Bellanova et al., 2022, p. 348). In this sense, regulatory mercantilism identifies policy formation as a means of state-building in response to geopolitical concerns, which this article aims to unpack. It does so by taking the three characteristics of regulatory mercantilism and applying them to the 2023 developments in cybersecurity policy. The first section highlights the EU's growing sense of geopolitical insecurity and vulnerability as a driver of policy; the second explores those policies in more depth, identifying the increased regulatory control the EU is seeking to exert in this policy domain; and the third reflects on the attempts at norm exporting through cyber-diplomacy.
The EU's 2023 actions in the field of cybersecurity are best understood in relation to the broader policy agenda and initiatives of the EU. With the formation of the von der Leyen Commission, a discourse of ‘digital sovereignty’ became central to the EU's actions in technology governance (Bellanova et al., 2022). The EU's digital sovereignty discourse expresses a desire for increased control as a response to a perceived sense of vulnerability to external threats posed by both non-EU states and private sector actors that may not align themselves with EU values or interests (Carrapico and Farrand, 2020). Shaping Europe's Digital Future, the Commission's policy agenda concerned with the ‘digital pillar’ of its 2019–2024 work programme framed this sovereignty ambition in terms of developing EU capabilities and reducing external dependencies (European Commission, 2020b, p. 3). It is closely linked to the concept of strategic autonomy (Broeders et al., 2023). The State of the Union 2023 underscores that this European sovereignty is ‘an economic and national security imperative to preserve a European edge on critical and emerging technologies’ (von der Leyen, 2023, p. 7), reinforcing this notion that EU security is determined by its ability to act independently of external constraints or pressures. These constraints include, namely, a lack of control over externally held or operated infrastructures, services and content providers (Madiega, 2020) with implications for the EU's capacity to protect citizens' data and security (Celeste, 2021; see also Chander and Sun, 2023); a dependence upon critical natural resources possessed or processed by other states required for producing technologies needed for cybersecurity purposes (DeCarlo and Goodman, 2022); and a perceived vulnerability to increased cyberthreats, whether in the form of disinformation, ransomware attacks, denial of service attacks or data breaches (Moerel and Timmers, 2021).
These identified digital vulnerabilities are closely related to the EU's broader sense of its own geopolitical vulnerabilities. This has often been implied in concerns expressed over challenges to the liberal international order as a rejection of globalisation (Braw, 2024), with increased disregard for international organisations and norms (Stephan, 2023) and a return to ‘great power’ politics between larger states (Weiß, 2023). In the context of these geopolitical changes, there has been a blurring of ‘cyber’ and ‘material’ security, with the EU discussing concerns over ‘hybrid’ threats in 2016 (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, 2016), with cybersecurity being one means by which hostile actors could destabilise the EU, whether through spreading disinformation or attacking critical information infrastructures (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, 2016, p. 10). This 2016 document was followed up in 2018 by a Communication on increasing resilience and bolstering capacities to address hybrid threats, where it was stated that ‘cybersecurity is critical to both our prosperity and security. As our daily lives and economies become increasingly dependent on digital technologies, we become more and more exposed’ (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, 2018, p. 7).
In 2023, the Russian war on Ukraine served to highlight the EU's perceived cyber-vulnerability resulting from broader geopolitical instability, with CERT-EU
2 monitoring the potential for Russia's actions to expand into cyber-operations against the EU's institutions. One of CERT-EU February 2023 report's key findings was that ‘cyber operations associated with Russia's war on Ukraine have not been confined to the belligerents. Since Russia's invasion, allies of Ukraine, such as EU countries, have faced several types of cyberattacks’ (CERT-EU, 2023, p. 3). New technologies are also classified as threats, with generative artificial intelligence (AI) featuring in both the State of the Union 2023 and a report produced by CERT-EU. In the State of the Union, it is explicitly framed as a security threat, with von der Leyen citing experts claiming that preventing human extinction by AI should be prioritised in the same way as preventing nuclear war, stating that AI ‘is a general technology that is accessible, powerful and adaptable for a vast range of uses – both civilian and military. And it is moving faster than even its developers anticipated. So we have a narrowing window of opportunity to guide this new technology’ (von der Leyen, 2023, p. 9). Similarly, CERT-EU stated that whilst generative AI could have potential cyber-defensive capabilities, they have significant concerns regarding its potential for cyber-offence, with uses including sophisticated social engineering attacks, more effective forms of phishing and automation of the identification of cybersecurity vulnerabilities allowing for the uncovering of previously unknown attack vectors (CERT-EU, 2023, p. 4). Given the concerns regarding the security implications of increased AI use, the European Commission has made clear the desire to regulate the use of the technology internally, through mechanisms such as the AI Act,
3 as well as seeking to guide the development of rules at the international level, both through the AI Act serving as a blueprint for the rest of the world and through guiding innovation and the implementation of minimum standards for safe and ethical use (von der Leyen, 2023, pp. 9–10).
2023 was a particularly active year for the EU's regulatory efforts in cybersecurity. Whilst admittedly agreed upon at the end of 2022, the directive on measures for a high common level of cybersecurity across the Union (Directive 2022/2555), also known as the NIS2 Directive, entered into force in January 2023. This directive repealed the original NIS Directive and is indicative of a form of regulatory cybersecurity ‘state making’ on the part of the EU. In its public facing FAQ document, the Commission explained its decision to repeal the original directive and create new legislation on the basis that it was responding to an expanded threat landscape and needed to address ‘an insufficient level of cyber resilience of businesses operating in the EU; inconsistent resilience across Member States and sectors; insufficient common understanding of the main threats and challenges across Member States; [and a] lack of joint crisis response’ (European Commission, 2023a). The proposal for the directive made clear the desire for increased control in this field, stating that the proposal was part of a package aimed at ‘strengthening the Union's strategic autonomy to improve its resilience and collective response’ (European Commission, 2020a, p. 1). Interestingly, in the final text of the directive, the link to vulnerability as a basis for intervention is found in recital 37, where it is stated that ‘intensified cyberattacks during the COVID-19 pandemic have shown the vulnerability of increasingly interdependent societies’ (Directive 2022/2555). As well as updating the pre-existing requirements under NIS1 (Directive 2016/1148), NIS2 provides for stronger oversight and enforcement in order to guarantee resilience from cyberattacks (Vandezande, 2024). Article 12 provides for co-ordinated vulnerability disclosure between member states (MSs), as well as the creation of a vulnerability database that will be maintained by European Union Agency for Cybersecurity (ENISA). Article 13 mandates co-operation at the national level between MSs, and Article 14 establishes a co-operation group ‘to support and facilitate strategic cooperation and the exchange of information among Member States’, the membership of which includes representatives of the MSs, the Commission and ENISA, with the European External Action Service acting as an observer.
2023 also saw a deepening of cybersecurity regulation in line with a regulatory mercantilist frame of heightened oversight and regulatory hierarchy, going from beyond the narrower confines of setting private sector obligations to the establishment of an all-encompassing cybersecurity framework. First, the Commission proposed modifications to the Cybersecurity Act, which had been adopted in 2019 (Regulation 2019/881) to expand its certification schemes to include managed security services. The Commission proposed this as means of raising the overall level of cybersecurity in the Union, which would facilitate the emergence of trusted cybersecurity service providers as a priority for the ‘industrial policy of the Union in the cybersecurity field’ (European Commission, 2023e, p. 1). The establishment of a European certification system based on European standards was central to the rationale of the Cybersecurity Act (Kohler, 2020), with the expansion of this regime to cover additional sector actors representing a deepening of this regulatory approach. The proposal, which has had its first European Parliament reading and is awaiting the Council's first reading position, states that its purpose is to support the EU Cyber Solidarity Act, which was also published in April 2023 (European Commission, 2023e, p. 2). Interestingly, the main legal basis for the act is Article 173 TFEU, which concerns the creation of the necessary conditions for the competitiveness of the EU's industry, which aligns with the underlying regulatory mercantilist position.
The proposal for the Cyber Solidarity Act makes explicit the link to the digital sovereignty agenda, highlighting the threat posed by external actors with references to Russian aggression and cyberattacks, as well as from other state and non-state actors (European Commission, 2023f, p. 1), strengthening solidarity through better detection of, preparation for, and responses to cybersecurity threats (European Commission, 2023f, p. 2). We see another form of cybersecurity industrial policy being devised within this framework – the means by which these objectives are to be achieved are through the ‘deployment of pan-European infrastructure’ in the form of security operations centres, named the EU Cyber Shield; the creation of an emergency response mechanism to support MSs in preparing for and responding to cyberattacks, as well as recovering from them; and the establishment of the European cybersecurity incident review mechanism, intended to allow for the review and assessment of significant incidents, with the cybershield and emergency response mechanism being directly funded by the Digital Europe Programme (European Commission, 2023f, p. 3). Article 1 of the proposed Cyber Solidarity Act explicitly includes in its objectives reinforcing ‘the competitive position of industry and services in the Union cross the digital economy and contribut[ing] to the Union's technological sovereignty in the area of cybersecurity’ (European Commission, 2023f, p. 22), reinforcing the regulatory mercantilist position adopted by the Commission in this field. As of May 2024, the act has secured political agreement between the Parliament and Council and is now awaiting formal approval subject to the Council's first reading (European Commission, 2024).
Two other measures directly focused on cybersecurity also made significant progress in 2023. The EU Cyber Resilience Act, first proposed in September 2022 (European Commission, 2022), received political agreement in December 2023, was voted favourably by the European Parliament in March 2024 and is now awaiting the Council's first reading (European Parliament, 2024). The purpose of the Cyber Resilience Act, which has Article 114 TFEU as its legal basis, is to ensure that hardware and software products made available in the EU are rendered cybersecure, through measures aimed at guaranteeing cybersecurity through a product's entire life cycle, as well as ensuring that consumers are given sufficient information concerning the security of products, permitting informed choices (European Commission, 2022, p. 2). The act is framed as supporting the Shaping Europe's Digital Future agenda, allowing the EU to ‘reap all the benefits of the digital age and to strengthen its industry and innovation capacity, within safe and ethical boundaries’ (European Commission, 2022, p. 3). This regulation will give the Commission considerable powers, under the heading of market surveillance and enforcement, including deeming products as non-compliant with the regulation and as presenting a significant cybersecurity risk based on an ENISA assessment. The Commission will then be able to adopt implementing acts applying Union-level restrictions, up to and including withdrawal from the market under Article 45 (European Commission, 2022, p. 59). Interestingly, concerns regarding AI are reflected in the Regulation, with products containing elements classified as high-risk AI systems under the proposed AI Act deemed as falling under the scope of the Cyber Resilience Act under Article 8.
Finally, 2023 saw the formal approval of the EU Institutional Cybersecurity Regulation (Regulation 2023/2841), which was published in the Official Journal in December 2023 and entered into force in January 2024. This regulation obliges all Union entities to have their own internal cybersecurity risk-management, governance and control frameworks under Article 6, the adoption of risk-management measures under Article 8 and to have established a cybersecurity plan by January 2026 under Article 9. Article 10 establishes the Interinstitutional Cybersecurity Board, comprising a representative of each of the Union's entities, which is tasked with monitoring and oversight of compliance with the regulation under Article 11. These combined measures indicate a comprehensive deepening of the EU's cybersecurity regulatory efforts, in which the Commission has fostered a cybersecurity industrial policy, heightening oversight within a regulatory mercantilist framework. As stated by Flonk, Jachtenfuchs and Obendiek, ‘even if the EU does not strongly promote the term “digital sovereignty” directly, the volume, bindingness and orientation of its policy output are indicative of a change towards a stronger assertion of its domestic sovereignty’ (Flonk et al., 2024, p. 23).
MSs have welcomed these different measures, which they believe to be necessary, at EU level, in order to foster a stronger common level of cybersecurity across the Union. The speed at which the proposals have received political agreement and have progressed through the legislative process, most being adopted following first reading, is indicative of the high level of consensus in this field. MSs have, however, highlighted the need to ensure coherence within this very rapidly expanding policy area and queried the effectiveness of the voluntary nature of some of the proposals (Council of the European Union, 2022b). These are, without doubt, issues that will re-emerge as the field continues to expand.
As mentioned in the introduction, the third element of the EU's regulatory mercantilist approach to cybersecurity consists in the attempt to export its norms and values beyond its borders with the aim to promote its vision of cybersecurity, and ultimately protect itself from cyberthreats. This ambition is particularly visible in the EU cyber-strategy, which identified international leadership as one of the main priority areas of EU external action (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, 2020). The EU hopes to achieve this leadership through seeking to define and shape international cybersecurity norms and standards, which it is disseminating through its cyber-diplomacy instruments (Latici, 2020). The EU perceives itself as a natural leader in this field and as being uniquely placed to define and promote such standards based on its founding democratic values, respect for the rule of law and fundamental rights. Moreover, it argues that international standards are often being used by non-EU countries to advance ‘their political and ideological’ visions (European Commission and High Representative of the Union for Foreign Affairs and Security Policy, 2020, p. 20), which are detrimental to EU growth, prosperity and security, making EU action in this field a particularly important priority.
Although EU efforts to become a key cyber-diplomacy global actor are not new (Council of the European Union, 2015; European External Action Service, 2016), we have been able to observe an acceleration in translating this rhetorical ambition into new policy initiatives and diplomatic tools. In practice, this has led to an increased spillover of EU cybersecurity policy from the common market and the area of freedom, security and justice to the CFSP. The new policy initiatives include an increased presence in multilateral bodies, a considerable growth in the number of bilateral agreements the EU has signed and instruments aimed at deepening EU integration (Renard, 2018). Amongst the latter, the 2017 EU cyber-diplomacy toolbox is particularly worthy of mention, as it introduces, for the first time, a joint diplomatic response to malicious cyber-activities (Council of the European Union, 2017). This initiative involves, in particular, a number of CFSP objectives, such as cyber-capability building in third countries, the introduction of EU-led political and thematic dialogues with non-EU countries and the imposing of restrictive measures beyond the EU territory. The Council of the European Union (2022a) has repeatedly stressed the importance of the link between EU external policies, the achievement of its cybersecurity objectives and the ambition to strengthen EU digital sovereignty.
2023 developments in this field further deepened and institutionalised this trend by emphasising the need for ‘a stronger, more strategic, coherent and effective EU policy and action in global digital affairs to confirm EU engagement and leadership’ (Council of the European Union, 2023, p. 2). More specifically, 2023 saw the EU continue to invest in four main routes to cybersecurity norm exporting: (1) increasing the coherence between cybersecurity policy and other externally facing digital policies, based on the idea that cybersecurity functions as an enabler of advancement in these other policy areas (which include, for instance, the digital promotion of human rights); (2) showing a more united front in international multilateral fora where cybersecurity standards are discussed, such as the International Telecommunication Union and the International Organisation for Standardisation, to ensure greater influence over decisions; (3) increasing the EU's presence in other multilateral organisations where internet governance is being discussed, namely, the United Nations, the World Trade Organisation and the Internet Corporation for Assigned Names and Numbers; and (4) continuing to expand and reinforce the existing network of bilateral and regional partnerships. 2023 saw the launch of the EU-Canada and the EU-Singapore digital partnerships, which prioritise cybersecurity, digital transformation and skills in EU priority areas such as semiconductors, quantum technologies and AI (European Commission, 2023b). Where regional partnerships are concerned, 2023 witnessed the birth of the EU-Latin America and Caribbean Digital Alliance, which focus on capacity building, connectivity, innovation and digitalisation in the region (European Commission, 2023c, 2023d). Finally, this year also saw the proposal to develop structured dialogues directly with the private sector (Council of the European Union, 2023). Although we have observed a considerable effort on the side of the EU to expand its capacity to export cybersecurity norms beyond its borders and to speak with one voice on the international stage, there is for the moment insufficient evidence to ascertain whether this approach is shaping third countries' stance on the topic.
2023 was not a year of grand pronouncements or radical policy shifts in the field of cybersecurity in the EU. Instead, it is a year in which the foundations that have been laid in previous years have been used to further construct a comprehensive EU cybersecurity policy agenda, which can be regarded as being represented by regulatory deepening and active attempts at norm exporting. In line with the explanatory theoretical framework presented in this article, this deepening has been underscored by an explicit securities and vulnerabilities discourse, in which action is required in order to ensure that the EU is able to mitigate against the threats posed to it by external actors and situations over which it feels it has limited control. This perception of limited control has also led the EU to develop a global norm exporting ambition, in line with regulatory mercantilism. As a response to external threats, the EU is seeking to use its regulatory capacity to develop robust standards for cybersecurity internally, which can then be exported to other states and to the international arena in the form of best standards and practices, based on self-described European values, as a means of cementing the EU's position as a global leader, promoting itself as a rule maker rather and in so doing, reducing its vulnerabilities. Through the lens of regulatory mercantilism, we see a blurring of economic and security goals, as well as cybersecurity and material security concerns, centred on the concepts of digital sovereignty and strategic autonomy. In this, EU cybersecurity policy cannot be considered niche or of interest to technical experts only – instead, it serves as a central pillar of the initiatives pursued by the EU in its desire to provide leadership to a world it perceives as presenting myriad complex threats to its continuing stability and security. Finally, given the current evolution of EU cybersecurity, we expect academic research to reflect the exponential expansion of this policy area. In particular, further research is needed to understand how this policy field is being governed, by whom and what impact the digital sovereignty discourse has had (or not) on its advancement. Furthermore, it is important to investigate the implications of the recent surge in EU regulatory cybersecurity measures, not only for the EU as an international leader in cybersecurity but also for its wider search for a more influential position on the world stage. New research in this field will, therefore, need to further examine EU cyber-diplomacy efforts and their implementation, in the context of both multilateral organisations and bilateral relations. From a legal perspective, future research may wish to consider the diverse array of legal bases used for furthering cybersecurity measures, assessing their internal coherence and fit.