Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • Themes & Topics

  • Tags

  • Type

  • Year

  • Actor

  • Clear all

Showing 196-210 of 537 results

   
   
Publication

Cyber Incident Classification: A Report on Emerging Practices within the OSCE region

Authors

Year

  • 2022

Description

  • The report highlights emerging practices in national classification of cyber incidents by underlinin…

 

Tool

.auCHECK

Authors

Year

  • 2022

Description

  • .auCheck is an initiative of the Australian Strategic Policy Institute (ASPI) in cooperation with au…

 

Tool

Mutually Agreed Norms for Routing Security (MANRS)

Authors

Year

  • 2014

Description

  • Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Interne…

 

Tool

NetBeacon

Authors

Year

  • 2022

Description

  • NetBeacon is a tool created by the DNS Abuse Institute to empower individuals and organizations to r…

 

Tool

Knowledge-sharing and Instantiating Norms for DNS and Naming Security (KINDNS)

Authors

Year

  • 2022

Description

  • KINDNS is an ICANN initiative to promote voluntary security best practices for authoritative and rec…

 

Publication

Compendio de Ciberdelincuencia Organizada

Authors

Year

  • 2022

Description

  • El presente compendio tiene como objectivo mostrar la forma en que sistemas de justicia de penal de …

 

Publication

Ukraine Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity: the legislative framework, and key national a…

 

Publication

Georgia Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity: the legislative framework and key national ac…

 

Publication

Azerbaijan Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…

 

Publication

Armenia Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…

 

Publication

Cybersecurity Capacity Building and Donor Coordination in the Western Balkans

Authors

Year

  • 2021

Description

  • This discussion paper explores how cyber capacity building actors and initiatives in the Western Bal…

 

Publication

Cybersecurity Policy Development and Capacity Building: Increasing regional cooperation in the Western Balkans

Authors

Year

  • 2021

Description

  • This paper identifies the ways in which closer regional collaboration is beneficial for building res…

 

Tool

Cyber Hygiene Course for Civil Servants

Authors

Year

  • 2022

Description

  • This course provides a simple, practical, 60-minute training for civil servants of all levels and pr…

 

Publication

Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach

Authors

Year

  • 2021

Description

  • This publication focuses on the Western Balkan region and seeks to portray this important issue thro…

 

Publication

Guide to Good Governance in Cybersecurity

Authors

Year

  • 2021

Description

  • Modern day challenges stemming from the increased dependence on cyberspace, and from its interconnec…

 

327

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.