Tool
Cyber Incident Tracer #HEALTH
Authors
Year
- 2020
Description
- CyberPeace Institute’s Cyber Incident Tracer is a platform bridges the information gap about c…
Cyber Incident Tracer #HEALTH
CyberPeace Institute’s Cyber Incident Tracer is a platform bridges the information gap about cyberattacks on the healthcare sector and their impact on people. It has been tracking disruptive cyberattacks since June 2020 and is updated quarterly.
Tool
Cyber Attacks in Times of Conflict
Authors
Year
- 2022
Description
- This tool monitors the harm to civilians from cyberattacks. It also provides insight into: Cyber Th…
Cyber Attacks in Times of Conflict
This tool monitors the harm to civilians from cyberattacks. It also provides insight into: Cyber Threats: Analyzing attacks & attribution to reach legal accountability. Impact & Harm: Tracing harm to civilians to protect civilians. Law & Policy: Documenting legal instruments to drive regulatory change.
Tool
Nonprofit Cyber Solutions Index
Authors
Year
- 2022
Description
- The Nonprofit Cyber Solutions Index is the first comprehensive index of actual cybersecurity capabil…
Nonprofit Cyber Solutions Index
The Nonprofit Cyber Solutions Index is the first comprehensive index of actual cybersecurity capabilities provided by the NGO community. In particular, the index identifies a large selection of free or low-cost cybersecurity capabilities for individuals, small businesses, and others left behind in the current environment. Other solutions, such as information […]
Tool
Blueprint for Ransomware Defense
Authors
Year
- 2022
Description
- The Blueprint for Ransomware is a clear, actionable framework for ransomware mitigation, response, a…
Blueprint for Ransomware Defense
The Blueprint for Ransomware is a clear, actionable framework for ransomware mitigation, response, and recovery for small and medium enterprises that are most relevant to combating ransomware. The Blueprint recommendations are a curated subset of essential cyber hygiene Safeguards from the Center for Internet Security Critical Security Controls® (CIS Controls®) […]
Publication
Ransomware Task Force Report: Combating Ransomware
Authors
Year
- 2021
Description
- The RTF Report is a strategic framework that aims to help policymakers and industry leaders take sys…
Ransomware Task Force Report: Combating Ransomware
The RTF Report is a strategic framework that aims to help policymakers and industry leaders take system-level action — through potential legislation, funding new programs, or launching new industry-level collaborations — that will help the international community build resistance, disrupt the ransomware business model, and develop resilience to the ransomware […]
Tool
Cyber Incident Management (CIM) Cybil Portal Resources Guide
Authors
Year
- 2022
Description
- The Cyber Incident Management (CIM) Cybil Portal Resources Guide is an initiative of the GFCE Workin…
Cyber Incident Management (CIM) Cybil Portal Resources Guide
The Cyber Incident Management (CIM) Cybil Portal Resources Guide is an initiative of the GFCE Working Group B CIM Task Force. The objective of this guide is to provide an overview of all the resources that are available for the CIM community on the Cybil Portal as of October 2022. […]
Publication
The Solution is in the Details: Building Cybersecurity Capacity in Europe
Authors
Year
- 2022
Description
- This paper uses theoretical and empirical methodologies to answer the question on how the 2020 Cyber…
The Solution is in the Details: Building Cybersecurity Capacity in Europe
This paper uses theoretical and empirical methodologies to answer the question on how the 2020 Cybersecurity Strategy, launched by the European Union (EU), should be implemented to ensure cybersecurity capacity building internally and externally. Accomplishing the aims of the 2020 Strategy will require a balancing of national and supranational direction […]
Tool
Cybersecurity Awareness Month 2022 Public Toolkit
Authors
Year
- 2022
Description
- This toolkit is designed to help provide organizations with the tools and resources to learn the bas…
Cybersecurity Awareness Month 2022 Public Toolkit
This toolkit is designed to help provide organizations with the tools and resources to learn the basics of cybersecurity. It contains resources for getting the word out, as well as information about the national campaign in October. This year’s campaign theme — “See Yourself in Cyber” — demonstrates that while […]
Publication
Raising Standards: Data and Artificial Intelligence in Southeast Asia
Authors
Year
- 2022
Description
- This publication is the culmination of a year-long research project on two major, interlinked pieces…
Raising Standards: Data and Artificial Intelligence in Southeast Asia
This publication is the culmination of a year-long research project on two major, interlinked pieces of the technological puzzle — data and artificial intelligence (AI) — in five Southeast Asian countries: Indonesia, Malaysia, Singapore, Thailand, and Viet Nam. Of importance was the extent to which data has contributed to inclusive […]
Publication
Establishing a CSIRT
Authors
Year
- 2017
Description
- This handbook is designed for organizations who wish to learn more about CSIRT teams and start one t…
Establishing a CSIRT
This handbook is designed for organizations who wish to learn more about CSIRT teams and start one themselves. It describes both the process to establish a team and the various requirements. Examples are given where possible, to show how each step can be completed. The intended audience is management level, […]
Tool
CSIRT Maturity Kit
Authors
Year
- 2015
Description
- The purpose of this CSIRT Maturity Kit is to help emerging and existing Computer Security Response T…
CSIRT Maturity Kit
The purpose of this CSIRT Maturity Kit is to help emerging and existing Computer Security Response Teams (CSIRTs) to increase their maturity level. This is achieved by offering a set of best practices that cover CSIRT governance, organisation and operations. The document that is presented now provides a starting point […]
Tool
SOC-CMM & SOC-CMM for CERT
Authors
Year
- 2022
Description
- The SOC-CMM is a capability maturity model that can be used to perform a self-assessment of your Sec…
SOC-CMM & SOC-CMM for CERT
The SOC-CMM is a capability maturity model that can be used to perform a self-assessment of your Security Operations Center (SOC). The model is based on review conducted on literature regarding SOC setup and existing SOC models as well as literature on specific elements within a SOC. The literature analysis […]
Tool
SIM3 Self Assessment Tool
Authors
Year
- 2022
Description
- The Open CSIRT Foundation developed an online self-assessment tool for SIM3. This tool is meant for …
SIM3 Self Assessment Tool
The Open CSIRT Foundation developed an online self-assessment tool for SIM3. This tool is meant for all types of CSIRTs. The tool assesses different aspects about the organisation, human (personnel), tools and processes aspects of a CSIRT.
Tool
ENISA CSIRT Maturity Framework
Authors
Year
- 2022
Description
- The ENISA CSIRT Maturity Framework is intended to contribute to the enhancement of the global capaci…
ENISA CSIRT Maturity Framework
The ENISA CSIRT Maturity Framework is intended to contribute to the enhancement of the global capacity to manage cyber incidents, with a focus on CSIRTs. Cyber incidents and developments are inherently transnational and effective responses depend on transnational collaboration. The establishment of national CSIRTs1 is an essential step to facilitate […]
Tool
ENISA – CSIRT Online Training Materials
Authors
Year
- 2019
Description
- ENISA Cyber Security Training material was introduced in 2008. Since then it has been complemented w…
ENISA – CSIRT Online Training Materials
ENISA Cyber Security Training material was introduced in 2008. Since then it has been complemented with new additions containing essential material for success in the CSIRT community and in the field of Cyber Security. Through it, you will find training material, containing Handbooks for teachers, Toolsets for students and Virtual […]