Europe

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 71-84 of 89 results

   
   
Tool

National Cyber Security Index (NCSI)

Authors

Year

  • 2018

Description

  • The National Cyber Security Index is a global index, which measures the preparedness of countries to…

 

National Cyber Security Index (NCSI)

The National Cyber Security Index is a global index, which measures the preparedness of countries to prevent cyber threats and manage cyber incidents. The NCSI is also a database with publicly available evidence materials and a tool for national cyber security capacity building. Facebook Page In line with Cybersecurity Awareness […]

Tool

Safeonweb.be

Authors

Year

  • 2016

Description

  • Safeonweb wants to quickly and accurately inform Belgian citizens and advise on cyber security high-…

 

Safeonweb.be

Safeonweb wants to quickly and accurately inform Belgian citizens and advise on cyber security high-end digital threats and online security.

Tool

Cyber Security KIT

Authors

Year

  • 2018

Description

  • The Cyber Security KIT: for SMEs and organizations raise awareness about cyber security among their …

 

Cyber Security KIT

The Cyber Security KIT: for SMEs and organizations raise awareness about cyber security among their employees. The Cyber Security KIT was developed by the Cyber Security Coalition and the Centre for Cybersecurity Belgium. With this KIT, we want to help SMEs and organizations raise awareness about cyber security among their […]

Tool

Election Awareness Guide (Surfer en toute sécurité pendant la campagne électorale)

Authors

Year

  • 2019

Description

  • Le guide « Surfer en toute sécurité pendant la campagne électorale » contient des recommandatio…

 

Election Awareness Guide (Surfer en toute sécurité pendant la campagne électorale)

Le guide « Surfer en toute sécurité pendant la campagne électorale » contient des recommandations en vue de (mieux) sécuriser les différents outils numériques que vous utilisez au quotidien.

Publication

IoT Security Standards Gap Analysis

Authors

Year

  • 2019

Description

  • This study analyses the gaps and provides guidelines for, in particular, the development or repositi…

 

IoT Security Standards Gap Analysis

This study analyses the gaps and provides guidelines for, in particular, the development or repositioning of standards, facilitating the adoption of standards and governance of EU standardisation in the area of NIS. Source – ENISA website

Publication

International Cyber Norms: Legal, Policy and Industry Perspectives

Authors

Year

  • 2016

Description

  • The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a serie…

 

International Cyber Norms: Legal, Policy and Industry Perspectives

The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a series of workshops organised by the NATO CCD COE during 2014-2015.1 The aim of the collection of articles is to shed light on the different approaches to ‘cyber norms’ in various research domains. The articles […]

Publication

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

Authors

Year

  • 2017

Description

  • The most comprehensive guide for policy advisors and legal experts on how existing International Law…

 

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

The most comprehensive guide for policy advisors and legal experts on how existing International Law applies to cyber operations. The Tallinn Manual process is continuing with a legal, technical, strategic and operational assessment of cyber scenarios, with the aim of publishing a practical reference source for Cyber Commands. Source – […]

Publication

An Evaluation Framework for National Cyber Security Strategies

Authors

Year

  • 2014

Description

  • An increasing number of countries in Europe have a National Cyber Security Strategy(NCSS) as a key p…

 

An Evaluation Framework for National Cyber Security Strategies

An increasing number of countries in Europe have a National Cyber Security Strategy(NCSS) as a key policy feature, helping them to tackle risks which have the potential to undermine the achievement of economic and social benefits from cyberspace. Eighteen European Union Member States have published a NCSS and some of […]

Publication

ENISA Threat Landscape Report 2018

Authors

Year

  • 2018

Description

  • 2018 was a year that brought significant changes in the cyberthreat landscape. Those changes origina…

 

ENISA Threat Landscape Report 2018

2018 was a year that brought significant changes in the cyberthreat landscape. Those changes originated in discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors. Monetization motives have contributed to the appearance of crypto-miners in the top 15 threats. State-sponsored activities […]

Tool

National Cyber Security Strategies: Practical Guide on Development and Execution

Authors

Year

  • 2012

Description

  • his report introduces a set of concrete actions, which if implemented will lead to a coherent and ho…

 

National Cyber Security Strategies: Practical Guide on Development and Execution

his report introduces a set of concrete actions, which if implemented will lead to a coherent and holistic national cyber-security strategy. It also proposes a national cyber-security strategy lifecycle, with a special emphasis on the development and execution phase. For each component of the strategy a list of possible and […]

Tool

Good Practice Guide on National Cyber Security Strategies

Authors

Year

  • 2016

Description

  • To meet current and emerging cyber security threats, EU Member States need to constantly develop and…

 

Good Practice Guide on National Cyber Security Strategies

To meet current and emerging cyber security threats, EU Member States need to constantly develop and adapt their  cyber security strategies. National cyber security strategies (NCSS) are the main documents of nation states to set strategic principles, guidelines, and objectives and in some cases specific measures in order to mitigate […]

Tool

Cybersecurity Strategies Evaluation Tool

Authors

Year

  • 2018

Description

  • ENISA created this tool to help Member States evaluate their strategic priorities and objectives rel…

 

Cybersecurity Strategies Evaluation Tool

ENISA created this tool to help Member States evaluate their strategic priorities and objectives related to National Cyber Security Strategies. Select your country’s cyber security priorities and answer a few simple questions (with a YES or a NO) to reveive ideas and advice for improvement. Source – ENISA website

Tool

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Authors

Year

  • 2016

Description

  • Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from …

 

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from the use of information and communication technologies will be consistent with: international law, including, inter alia, the UN Charter and the International Covenant on Civil and Political Rights; the Helsinki Final Act; and their responsibilities […]

Publication

Digital society in South East Europe

Authors

Year

  • 2024

 

Digital society in South East Europe

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.