Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • Themes & Topics

  • Tags

  • Type

  • Year

  • Actor

  • Clear all

Applied Filters

Actor: United Kingdom

Showing 1-15 of 21 results

   
   
Tool

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

Authors

Year

  • 2025

Description

  • This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…

 

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”, a maturity baseline developed from the SIM3 model2 created by the Open CSIRT Foundation (OCF), an internationally recognized model for assessing the maturity of security teams. CSIRTAmericas Baseline serves to help organizations assess the readiness of their cyber incident […]

Publication

The Partners in the Blue Pacific P4C Outcomes Report

Authors

Year

  • 2024

Description

  • The inaugural Partners in the Blue Pacific (PFP) Pacific for Cyber Capacity Building and Coordinatio…

 

The Partners in the Blue Pacific P4C Outcomes Report

The inaugural Partners in the Blue Pacific (PFP) Pacific for Cyber Capacity Building and Coordination (P4C) was held in Nadi, Fiji from 2nd to 4th of October 2023. Over 80 representatives gathered from the Pacific island countries, PBP member countries and non-government stakeholders to facilitate a Pacific centred dialogue to […]

Publication

Cybersecurity Ecosystem Report, Western Balkans Emerging Cyber threats

Authors

Year

  • 2022

Description

  • This Cybersecurity Ecosystem Report maps cyber threats in the Western Balkans, identifying key risks…

 

Cybersecurity Ecosystem Report, Western Balkans Emerging Cyber threats

This Cybersecurity Ecosystem Report maps cyber threats in the Western Balkans, identifying key risks, threats, incident and attack types, and, where possible, threat actors. Commissioned by the UK Government, the report has been prepared jointly by PwC, focusing on the global and regional threat landscape, and the ISAC Fund, providing […]

Publication

Joint international guidance: Principles and approaches to secure-by-design and by-default

Authors

Year

  • 2023

Description

  • About CERT NZ alongside the cybersecurity authorities of Australia, Canada, United States, United Ki…

 

Joint international guidance: Principles and approaches to secure-by-design and by-default

About CERT NZ alongside the cybersecurity authorities of Australia, Canada, United States, United Kingdom, Germany, and Netherlands have published “Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default.” Details The joint guidance urges software manufacturers to the steps necessary to ship products that are secure-by-design and […]

Publication

London conference on Cyber Resilience: Lessons on cybersecurity capacity-building from the UK’s Digital Access Programme

Authors

Year

  • 2023

Description

  • On 21–22 November 2022, Chatham House hosted the Strengthening Cyber Resilience Conference in Lond…

 

London conference on Cyber Resilience: Lessons on cybersecurity capacity-building from the UK’s Digital Access Programme

On 21–22 November 2022, Chatham House hosted the Strengthening Cyber Resilience Conference in London, with support from FCDO and in partnership with KPMG. The conference’s aim was to share experiences and knowledge about how international cybersecurity capacity-building can support national sustainable development and cybersecurity outcomes. The conference also explored the […]

Publication

African Cyberthreat Assessment Report 2023: Cyberthreat Trends

Authors

Year

  • 2023

Description

  • This report provides a comprehensive overview of cyberthreat trends in the African region in 2022. T…

 

African Cyberthreat Assessment Report 2023: Cyberthreat Trends

This report provides a comprehensive overview of cyberthreat trends in the African region in 2022. The data for drafting it was drawn from INTERPOL’s member countries, private partners, and research conducted by the Africa Cybercrime Operations Desk. Some of the most relevant threats identified within the report are: Business Email […]

Publication

Improving Resilience to Ransomware with Cybersecurity Capacity Building

Authors

Year

  • 2022

Description

  • Through this paper, the authors aim to identify specific cybersecurity capacity building activities …

 

Improving Resilience to Ransomware with Cybersecurity Capacity Building

Through this paper, the authors aim to identify specific cybersecurity capacity building activities and mechanisms that policymakers may consider to enhance their organisations’ resilience to ransomware attacks and other forms of cybercrime. These focus on developing cybersecurity skills and capacity, defining a regulatory response to ransomware, building effective partnerships for […]

Publication

National Strategic Assessment of Serious and Organised Crime

Authors

Year

  • 2020

Description

  • The National Crime Agency has published the National Strategic Assessment of Serious and Organised C…

 

National Strategic Assessment of Serious and Organised Crime

The National Crime Agency has published the National Strategic Assessment of Serious and Organised Crime 2020. It provides a single authoritative picture of the threat to the UK from serious and organised crime. It shows that we are confronted with a rapidly evolving threat that is becoming increasingly complex as […]

Tool

Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity

Authors

Year

  • 2020

Description

  • This joint advisory is the result of a collaborative research effort by the cybersecurity authoritie…

 

Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity

This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia Canada New Zealand The United Kingdom The United States It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of this report is […]

Tool

Cyber Security Small Business Guide

Authors

Year

  • 2018

Description

  • Cyber security needn’t be a daunting challenge for small business owners. Following the five q…

 

Cyber Security Small Business Guide

Cyber security needn’t be a daunting challenge for small business owners. Following the five quick and easy steps outlined in the guide below could save time, money and even your business’ reputation. This guide can’t guarantee protection from all types of cyber attack, but the steps outlined below can significantly […]

Tool

nCSIRT Guide – Self Help

Authors

Year

  • 2021

Description

  • This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonweal…

 

nCSIRT Guide – Self Help

This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonwealth countries continue to develop cybersecurity systems.

Publication

Cyber Threat Intelligence Sharing

Authors

Year

  • 2021

Description

  • Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of…

 

Cyber Threat Intelligence Sharing

Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of projects to help Commonwealth countries improve their cyber security capacity. This document explains work towards platforms to share information on cyber security domestically, regionally and globally, and across sectors. It aims to enable businesses and other organisations […]

Publication

African Cyber Experts Fellowship: Lessons Learnt Report 2020

Authors

Year

  • 2021

Description

  • The purpose of this document is to draw out some of the key lessons learnt from the discussions held…

 

African Cyber Experts Fellowship: Lessons Learnt Report 2020

The purpose of this document is to draw out some of the key lessons learnt from the discussions held as part of the African Cyber Experts Fellowship programme. This is the first iteration of the document, but it is intended to be a living document which can be supplemented and […]

Publication

Seminar Summary: Enhancing Cybersecurity – The Role of Innovation Ecosystems

Authors

Year

  • 2019

Description

  • This document summarizes the conversations from the seminar “Enhancing Cybersecurity – The Role …

 

Seminar Summary: Enhancing Cybersecurity – The Role of Innovation Ecosystems

This document summarizes the conversations from the seminar “Enhancing Cybersecurity – The Role of Innovation Ecosystems” that took place on February 13th 2019 at the Massachusetts Institute of Technology in Cambridge, Massachusetts. The goal of the Seminar was to advance participants’ knowledge of innovation ecosystems for innovation in cybersecurity. Its […]

Publication

Cybersecurity Awareness in the Commonwealth of Nations

Authors

Year

  • 2020

Description

  • The Cybersecurity Tech Accord and the United Kingdom’s Foreign and Commonwealth Office have collab…

 

Cybersecurity Awareness in the Commonwealth of Nations

The Cybersecurity Tech Accord and the United Kingdom’s Foreign and Commonwealth Office have collaborated in developing this report as part of an ongoing partnership to better understand and promote cybersecurity awareness across the Commonwealth of Nations (“the Commonwealth ). It provides a brief introduction to both the Cybersecurity Tech Accord […]

6

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.