Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • Themes & Topics

  • Tags

  • Type

  • Year

  • Actor

  • Clear all

Applied Filters

Actor: DCAF – Geneva Centre for Security Sector Governance

Showing 1-15 of 27 results

   
   
Tool

Guide to Developing a National Cybersecurity Strategy (2nd Edition 2021)

Authors

Year

  • 2021

Description

  • The purpose of this document is to guide national leaders and policy-makers in the development of a …

 

Guide to Developing a National Cybersecurity Strategy (2nd Edition 2021)

The purpose of this document is to guide national leaders and policy-makers in the development of a National Cybersecurity Strategy, and in thinking strategically about cybersecurity, cyber-preparedness and resilience. This Guide aims to provide a useful, flexible and user-friendly framework to set the context of a country’s socio-economic vision and […]

Publication

Intrusions on State Digital Infrastructure in North Macedonia: Digital Human Rights Impact Analysis

Authors

Year

  • 2022

Description

  • This paper is focused on the protection of digital critical infrastructure, intrusions, and the imp…

 

Intrusions on State Digital Infrastructure in North Macedonia: Digital Human Rights Impact Analysis

This paper is focused on the protection of digital critical infrastructure, intrusions, and the impact on digital human rights. Implications on human rights can be serious if the state does not have good cyber security governance that protects rights, such as right of privacy and right of freedom of expression. Macedonian […]

Publication

Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders

Authors

Year

  • 2024

Description

  • This Guidebook is intended to help, in particular, new employees of Computer Security Incident Respo…

 

Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders

This Guidebook is intended to help, in particular, new employees of Computer Security Incident Response Teams (CSIRTs) (though it is likely relevant for existing CSIRT employees) understand the structure of CSIRTs, and clarify the expectations and how they can best be achieved.

Publication

Cybersecurity and Human Rights in the Western Balkans: Mapping Governance and Actors

Authors

Year

  • 2024

Description

  • Description This publication focuses on mapping cybersecurity-related human rights opportunities and…

 

Cybersecurity and Human Rights in the Western Balkans: Mapping Governance and Actors

Description This publication focuses on mapping cybersecurity-related human rights opportunities and challenges in WB. There are six chapters in total, one for each economy in the Western Balkans. Each begins with essential conceptual background information regarding the cybersecurity and human rights contexts of each economy. Finally, they present ways forward, […]

Publication

Developing a cybersecurity crisis management plan

Authors

Year

  • 2023

Description

  • In October 2022, DCAF – the Geneva Centre for Security Sector Governance, brought together legal e…

 

Developing a cybersecurity crisis management plan

In October 2022, DCAF – the Geneva Centre for Security Sector Governance, brought together legal experts from the Western Balkans for a Seminar on National Cybersecurity Legislation in Veles, North Macedonia. The seminar was organised in close cooperation with the Ministry of Information Society and Administration of the Republic of […]

Publication

Ukraine Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity: the legislative framework, and key national a…

 

Ukraine Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity: the legislative framework, and key national actors in cybersecurity. It describes the main cybersecurity threats in Ukraine and the needs arising from its national security objectives. The present assessment paper describes the normative and legislative framework of the Ukraine, which covers the […]

Publication

Georgia Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity: the legislative framework and key national ac…

 

Georgia Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity: the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in Georgia and the needs arising from national security objectives. It describes the normative and legislative framework of Georgia covering the main […]

Publication

Azerbaijan Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…

 

Azerbaijan Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity, including the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in Azerbaijan and the needs arising from national security objectives. It describes the normative and legislative framework of Azerbaijan which covers […]

Publication

Armenia Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…

 

Armenia Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity, including the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in the Republic of Armenia, and the needs arising from national security objectives. It describes the normative and legislative framework of […]

Publication

Cybersecurity Capacity Building and Donor Coordination in the Western Balkans

Authors

Year

  • 2021

Description

  • This discussion paper explores how cyber capacity building actors and initiatives in the Western Bal…

 

Cybersecurity Capacity Building and Donor Coordination in the Western Balkans

This discussion paper explores how cyber capacity building actors and initiatives in the Western Balkans could be better coordinated, while considering the barriers to reaching cyber maturity in the region. Firstly, the paper offers a brief overview of projects, donors, and implementing organisations active in the Western Balkans, based on […]

Publication

Cybersecurity Policy Development and Capacity Building: Increasing regional cooperation in the Western Balkans

Authors

Year

  • 2021

Description

  • This paper identifies the ways in which closer regional collaboration is beneficial for building res…

 

Cybersecurity Policy Development and Capacity Building: Increasing regional cooperation in the Western Balkans

This paper identifies the ways in which closer regional collaboration is beneficial for building resilience, enhancing regional cybersecurity and enhancing strategic communication, collaboration and partnerships. The cybersecurity workforce shortage, skills gap and slow progress in public administration reforms are significant concerns for economic development and national security in the region, […]

Tool

Cyber Hygiene Course for Civil Servants

Authors

Year

  • 2022

Description

  • This course provides a simple, practical, 60-minute training for civil servants of all levels and pr…

 

Cyber Hygiene Course for Civil Servants

This course provides a simple, practical, 60-minute training for civil servants of all levels and profiles who, as part of their work, deal with official data and various types of information, and use computers and other IT equipment in the performance of their official duties. It is relevant for existing […]

Publication

Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach

Authors

Year

  • 2021

Description

  • This publication focuses on the Western Balkan region and seeks to portray this important issue thro…

 

Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach

This publication focuses on the Western Balkan region and seeks to portray this important issue through vivid case studies from Albania, Bosnia and Herzegovina, and Serbia. While each case study is unique, the stories of the women portrayed in them are symbolic of the struggles many women around the world […]

Publication

Guide to Good Governance in Cybersecurity

Authors

Year

  • 2021

Description

  • Modern day challenges stemming from the increased dependence on cyberspace, and from its interconnec…

 

Guide to Good Governance in Cybersecurity

Modern day challenges stemming from the increased dependence on cyberspace, and from its interconnectivity with society globally, require an array of different responses. Governments, the private sector and civil society have to come together to address the challenges of cybersecurity governance. In addition, legal and policy frameworks will have to […]

Publication

Legal and policy frameworks in Western Balkan economies on PPPs in cybersecurity

Authors

Year

  • 2021

Description

  • This publication builds up on the Cybersecurity in the Western Balkans: a Guide to Public-Private Pa…

 

Legal and policy frameworks in Western Balkan economies on PPPs in cybersecurity

This publication builds up on the Cybersecurity in the Western Balkans: a Guide to Public-Private Partnerships and provides and a succinct overview of the legal and policy frameworks already in place in the Western Balkan economies that cover Public-Private-Partnerships cooperation and cybersecurity.

12

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.