Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • Themes & Topics

  • Tags

  • Type

  • Year

  • Actor

  • Clear all

Showing 496-510 of 537 results

   
   
Tool

Cybersecurity Awareness Campaign Toolkit

Authors

Year

  • 2015

Description

  • This toolkit is designed to provide governments or organizations guidance and resources for developi…

 

Tool

Focus Awareness-Building Through a Cybersecurity Awareness Month

Authors

Year

  • 2017

Description

  • The National Cybersecurity Awareness Month (NCSAM) is an example of a cybersecurity awareness campai…

 

Tool

Align National Campaigns

Authors

Year

  • 2017

Description

  • Cooperation, alignment, and coordination with others is beneficial. In planning and organising an aw…

 

Tool

IBM X-Force Exchange

Authors

Year

  • 2015

Description

  • IBM® X-Force Exchange is a cloud-based, threat intelligence sharing platform that you can use to ra…

 

Tool

The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers

Authors

Year

  • 2017

Description

  • Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. …

 

Tool

GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)

Authors

Year

  • 2017

Description

  • Some elements of ICT have become critical for national security. These elements form the Critical  …

 

Tool

Produce and Present Trusted Metrics about Systemic Risk Conditions

Authors

Year

  • 2017

Description

  • A statistics platform, featuring metrics and data visualisation, allows for the measurement of key i…

 

Tool

Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks

Authors

Year

  • 2017

Description

  • Internet networks are replete with systemic vulnerabilities. CERTs and other trusted  operators req…

 

Publication

Harnessing the Internet of Things for Global Development

Authors

Year

  • 2016

Description

  • This report explores the current use and potential of Internet of Things (IoT) technologies in tackl…

 

Publication

An Internet of Things Reference of Architecture

Authors

Year

  • 2016

Description

  • The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices…

 

Publication

IoT Security Standards Gap Analysis

Authors

Year

  • 2019

Description

  • This study analyses the gaps and provides guidelines for, in particular, the development or repositi…

 

Publication

IoT Security Whitepaper 2018

Authors

Year

  • 2018

Description

  • In February 2017, Huawei released the white paper Building a Trusted and Managed IoT World with Inst…

 

Publication

International Cyber Norms: Legal, Policy and Industry Perspectives

Authors

Year

  • 2016

Description

  • The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a serie…

 

Publication

Confidence Building Measures and International Cybersecurity

Authors

Year

  • 2013

Description

  • The meeting in Zurich took place at an important moment. Recent events have shown that much remains …

 

Publication

Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary

Authors

Year

  • 2017

Description

  • This publication contains a commentary on the voluntary, non-binding norms of responsible State beha…

 

27

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.