North America

Countries in this region: Canada, United States
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 16-30 of 33 results

   
   
Publication

CISA Cybersecurity Resources | CISA

Authors

Year

  • 2021

Description

  • To decrease cybersecurity risks and protect yourself online, CISA offers the following resources to …

 

CISA Cybersecurity Resources | CISA

To decrease cybersecurity risks and protect yourself online, CISA offers the following resources to share in your communities and with your stakeholders. These tools are not only valuable during National Cybersecurity Awareness Month (NCSAM) but throughout the year. CISA’s Telework Resources – Telework Guidance and Best Practices As the Nation’s risk […]

Publication

A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State

Authors

Year

  • 2019

Description

  • The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity an…

 

A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State

The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) developed “A Guide to Critical Infrastructure Security and Resilience” guide to serve as an overview of the U.S.  all-hazards approach to critical infrastructure security and resilience.  It is intended for both […]

Publication

NIPP 2013: Partnering for Critical Infrastructure Security and Resilience | CISA

Authors

Year

  • 2013

Description

  • This is the National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastruct…

 

NIPP 2013: Partnering for Critical Infrastructure Security and Resilience | CISA

This is the National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastructure Security and Resilience.

Publication

Ransomware | CISA & MS-ISAC

Authors

Year

  • 2021

Description

  • Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any …

 

Ransomware | CISA & MS-ISAC

Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if […]

Publication

CISA Global | CISA

Authors

Year

  • 2021

Description

  • CISA Global outlines how CISA will work with international partners to fulfill our responsibilities,…

 

CISA Global | CISA

CISA Global outlines how CISA will work with international partners to fulfill our responsibilities, execute our work, and create unity of effort within our mission areas. The strategy details CISA’s international vision and commits the agency to four goals: Advancing operational cooperation; Building partner capacity; Strengthening collaboration through stakeholder engagement […]

Publication

Cyber Threat Intelligence Sharing

Authors

Year

  • 2021

Description

  • Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of…

 

Cyber Threat Intelligence Sharing

Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of projects to help Commonwealth countries improve their cyber security capacity. This document explains work towards platforms to share information on cyber security domestically, regionally and globally, and across sectors. It aims to enable businesses and other organisations […]

Tool

CyberSeek

Authors

Year

  • 2016

Description

  • To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about suppl…

 

CyberSeek

To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market. Cybersecurity workers protect our most important and private information, from bank accounts to sensitive military communications. However, there is a dangerous shortage of cybersecurity workers in the United States […]

Publication

Improving Cybersecurity Awareness in Underserved Populations

Authors

Year

  • 2019

Description

  • This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highli…

 

Improving Cybersecurity Awareness in Underserved Populations

This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highlights research indicating that “underserved” residents in San Francisco, California— including low-income residents, seniors, and foreign language speakers—face higher-than-average risks of being victims of cyber attacks. They are less likely to know whether they have even been […]

Publication

Cybersecurity Workforce Development: A Primer

Authors

Year

  • 2018

Description

  • This report unpacks the many issues and questions that collectively make up “the cybersecurity wor…

 

Cybersecurity Workforce Development: A Primer

This report unpacks the many issues and questions that collectively make up “the cybersecurity workforce development challenge” in the United States. Our aim is to inform the discussion, make the case that the challenge warrants policy intervention, and highlight areas ripe for further research and policy intervention. We argue that […]

Publication

Low-Hanging Fruit | Evidence-Based Solutions to the Digital Evidence Challenge

Authors

Year

  • 2018

Description

  • The purpose of this report is to focus attention on a range of too-often neglected challenges and op…

 

Low-Hanging Fruit | Evidence-Based Solutions to the Digital Evidence Challenge

The purpose of this report is to focus attention on a range of too-often neglected challenges and opportunities faced by law enforcement as they seek to access and use digital evidence in their cases.

Publication

The Need for Better Metrics on Cybercrime

Authors

Year

  • 2019

Description

  • The United States is facing a massive cybercrime wave, yet there are no comprehensive statistics ava…

 

The Need for Better Metrics on Cybercrime

The United States is facing a massive cybercrime wave, yet there are no comprehensive statistics available on the size and scope of the problem and law enforcement’s actions against it. Without these statistics, it is difficult to make an informed case for policy changes to reduce the cybercrime wave and […]

Publication

Standardisation issues affecting EU/US ICT development collaboration

Authors

Year

  • 2017

Description

  • This policy paper focuses on ICT standardisation policy considerations in the EU and the US that aff…

 

Standardisation issues affecting EU/US ICT development collaboration

This policy paper focuses on ICT standardisation policy considerations in the EU and the US that affect and are affected by, in particular ICT, development collaboration related to 5G Networks, Big Data and Internet of Things/Cyber Physical Systems.

Publication

Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks

Authors

Year

  • 2019

Description

  • The Internet of Things (IoT) is a rapidly evolving and expanding collection of diverse technologies …

 

Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks

The Internet of Things (IoT) is a rapidly evolving and expanding collection of diverse technologies that interact with the physical world.  This publication identifies three high-level considerations that may affect the management of cybersecurity and privacy risks for IoT devices as compared to conventional IT devices. Source – NIST website […]

Tool

Strategic Practices for Securing the Internet of Things (IoT)

Authors

Year

  • 2016

Description

  • The growth of network-connected devices, systems, and services comprising the Internet of Things (Io…

 

Strategic Practices for Securing the Internet of Things (IoT)

The growth of network-connected devices, systems, and services comprising the Internet of Things (IoT)1 creates immense opportunities and benefits for our society. IoT security, however, has not kept up with the rapid pace of innovation and deployment, creating substantial safety and economic risks. This document explains these risks and provides […]

Tool

Cybersecurity Awareness Campaign Toolkit

Authors

Year

  • 2015

Description

  • This toolkit is designed to provide governments or organizations guidance and resources for developi…

 

Cybersecurity Awareness Campaign Toolkit

This toolkit is designed to provide governments or organizations guidance and resources for developing a cybersecurity awareness campaign. Our goal is to help you think through your country’s needs for a cybersecurity awareness campaign and how to best achieve it whether you have aw large budget or limited resources. We […]

3

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.