Publication
Next Steps for the EU: Building on the Paris Call and EU Cybersecurity Strategy
Authors
Year
- 2022
Description
- About This policy brief introduces an approach to cybersecurity capacity building as the next step f…
Next Steps for the EU: Building on the Paris Call and EU Cybersecurity Strategy
About This policy brief introduces an approach to cybersecurity capacity building as the next step for moving forward on the European Union (EU) Cybersecurity Strategy. Deployment of the Cybersecurity Capacity Maturity Model for Nations (CMM), developed by the Global Cyber Security Capacity Centre (GCSCC) at Oxford University, is provided as […]
Publication
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise
Year
- 2022
Description
- About This paper assesses the impact of cybersecurity education, awareness raising, and training (CE…
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise
About This paper assesses the impact of cybersecurity education, awareness raising, and training (CEAT) on the vitality of internet use and services at the national level in 80 nations. CEAT encompasses one of five dimensions of a larger cybersecurity capacity building model (CMM) that was developed by the Global Cybersecurity […]
Publication
Cyber Insurance and Systemic Market Risk
Authors
Year
- 2020
Description
- This report proposes a method to better protect against losses associated with attacks by malicious …
Cyber Insurance and Systemic Market Risk
This report proposes a method to better protect against losses associated with attacks by malicious actors. The EastWest Institute puts forward a mechanism by which insurance industry can quantify and account for cyber risks. Recommendations to increase the cyber resilience and cybersecurity of economies are presented thereafter.
Publication
Weathering TechNationalism: A Security and Trustworthiness Framework to Manage Cyber Supply Chain Risk
Authors
Year
- 2020
Description
- This report assesses the consequences of technological nationalism and economic competitiveness in c…
Weathering TechNationalism: A Security and Trustworthiness Framework to Manage Cyber Supply Chain Risk
This report assesses the consequences of technological nationalism and economic competitiveness in cyberspace. It provides policymakers, regulators, and related private actors a framework for estimating risks associated with the restriction of foreign ICT products within a national technological ecosystem. After evaluation of global ICT supply chains, policy recommendations to ensure […]
Publication
London conference on Cyber Resilience: Lessons on cybersecurity capacity-building from the UK’s Digital Access Programme
Authors
Year
- 2023
Description
- On 21–22 November 2022, Chatham House hosted the Strengthening Cyber Resilience Conference in Lond…
London conference on Cyber Resilience: Lessons on cybersecurity capacity-building from the UK’s Digital Access Programme
On 21–22 November 2022, Chatham House hosted the Strengthening Cyber Resilience Conference in London, with support from FCDO and in partnership with KPMG. The conference’s aim was to share experiences and knowledge about how international cybersecurity capacity-building can support national sustainable development and cybersecurity outcomes. The conference also explored the […]
Publication
CMM Review Ecuador
Authors
Year
- 2022
Description
- The Global Cyber Security Capacity Centre (GCSCC) at the University of Oxford developed the CMM as a…
CMM Review Ecuador
The Global Cyber Security Capacity Centre (GCSCC) at the University of Oxford developed the CMM as a framework to facilitate the review of the maturity of a country’s cyber security capacity in consultation with 200+ international experts drawn from governments, international organisations, academia, public and private sectors, and civil society. […]
Tool
European Repository of Cyber Incidents (EuRepoC)
Authors
Year
- 2022
Description
- The European Repository of Cyber Incidents (EuRepoC) is an independent research consortium dedicat…
European Repository of Cyber Incidents (EuRepoC)
The European Repository of Cyber Incidents (EuRepoC) is an independent research consortium dedicated to better understanding the cyber threat environment, particularly in the European Union. As a public information forum, its goal is to be a resource for its member institutions, government officials, civil society, business executives, journalists, educators, students, and other […]
Publication
Cybersecurity Insights from Industry Leaders – LATAM CISO Report (2023)
Authors
Year
- 2023
Description
- The LATAM CISO 2023 Cybersecurity Report provides insights from industry leaders regarding the level…
Cybersecurity Insights from Industry Leaders – LATAM CISO Report (2023)
The LATAM CISO 2023 Cybersecurity Report provides insights from industry leaders regarding the level of cyber resilience among various organizations in the Latin American region. This report was created to identify gaps in security, as well as the needs and limitations of organizations in Latin America that are preventing them […]
Tool
The Cybersecurity Higher Education Database (CyberHEAD)
Authors
Year
- 2023
Description
- The Cybersecurity Higher Education Database (CyberHEAD) is the largest validated cybersecurity high…
The Cybersecurity Higher Education Database (CyberHEAD)
The Cybersecurity Higher Education Database (CyberHEAD) is the largest validated cybersecurity higher education database in the EU and EFTA countries. It has been the main point of reference for all citizens looking to upskill their knowledge in the cybersecurity field. This list allows young talents to make informed decisions on the […]
Publication
Practical Guide for CSIRTs (Volume 2): A Sustainable Business Model
Authors
Year
- 2023
Description
- This guide is based on the previous document “Best Practices for Establishing a National CSIRT…
Practical Guide for CSIRTs (Volume 2): A Sustainable Business Model
This guide is based on the previous document “Best Practices for Establishing a National CSIRT“, developed by the Organization of American States (OAS) in 2016, which covers topics on planning and implementing a Computer Security Incident Response Team (CSIRT). This second edition is intended to build upon the previous and […]
Publication
Emerging Practices in Cybersecurity-Related Public-Private Partnerships and Collaboration in OSCE participating States
Authors
Year
- 2023
Description
- This report evidences the implementation of OSCE cyber/ICT security Confidence-Building Measure 14, …
Emerging Practices in Cybersecurity-Related Public-Private Partnerships and Collaboration in OSCE participating States
This report evidences the implementation of OSCE cyber/ICT security Confidence-Building Measure 14, which encourages states to establish public-private partnerships to respond to common security challenges stemming from the use of Information and Communication Technologies. It provides examples of existing practice from the OSCE region, as well as baseline recommendations to […]
Tool
Cyber Incident Reporting Framework: Global Edition
Authors
Year
- 2023
Description
- The updated, global edition of the framework presented here builds off that first document that CTA …
Cyber Incident Reporting Framework: Global Edition
The updated, global edition of the framework presented here builds off that first document that CTA and IST released in November 2022, and adds significant contextual discussion. It develops a model reporting format that cybersecurity authorities and other government authorities worldwide could use as the foundation for their national reporting […]
Publication
Measuring CERT Effectiveness – “What does good look like?”
Authors
Year
- 2023
Description
- The purpose of this White Paper is to identify how CERTs, globally, ensure they are delivering on th…
Measuring CERT Effectiveness – “What does good look like?”
The purpose of this White Paper is to identify how CERTs, globally, ensure they are delivering on the vision that launched their creation. CERTs were created to address a problem, so how are we measuring that the problem is being addressed? To answer the main question of what does good […]
Publication
Cybersecurity of AI and Standarisation
Authors
Year
- 2023
Description
- The overall objective of the present document is to provide an overview of standards (existing, bein…
Cybersecurity of AI and Standarisation
The overall objective of the present document is to provide an overview of standards (existing, being drafted, under consideration and planned) related to the cybersecurity of artificial intelligence (AI), assess their coverage and identify gaps in standardisation. The report describes the standardisation landscape covering AI, by depicting the activities of […]
Publication
African Cyberthreat Assessment Report 2023: Cyberthreat Trends
Authors
Year
- 2023
Description
- This report provides a comprehensive overview of cyberthreat trends in the African region in 2022. T…
African Cyberthreat Assessment Report 2023: Cyberthreat Trends
This report provides a comprehensive overview of cyberthreat trends in the African region in 2022. The data for drafting it was drawn from INTERPOL’s member countries, private partners, and research conducted by the Africa Cybercrime Operations Desk. Some of the most relevant threats identified within the report are: Business Email […]