Publication
NIPP 2013: Partnering for Critical Infrastructure Security and Resilience | CISA
Authors
Year
- 2013
Description
- This is the National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastruct…
NIPP 2013: Partnering for Critical Infrastructure Security and Resilience | CISA
This is the National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastructure Security and Resilience.
Publication
Ransomware | CISA & MS-ISAC
Authors
Year
- 2021
Description
- Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any …
Ransomware | CISA & MS-ISAC
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if […]
Publication
CISA Global | CISA
Authors
Year
- 2021
Description
- CISA Global outlines how CISA will work with international partners to fulfill our responsibilities,…
CISA Global | CISA
CISA Global outlines how CISA will work with international partners to fulfill our responsibilities, execute our work, and create unity of effort within our mission areas. The strategy details CISA’s international vision and commits the agency to four goals: Advancing operational cooperation; Building partner capacity; Strengthening collaboration through stakeholder engagement […]
Publication
Cyber Threat Intelligence Sharing
Authors
Year
- 2021
Description
- Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of…
Cyber Threat Intelligence Sharing
Following the London 2018 Commonwealth Cyber Declaration, the UK government implemented a series of projects to help Commonwealth countries improve their cyber security capacity. This document explains work towards platforms to share information on cyber security domestically, regionally and globally, and across sectors. It aims to enable businesses and other organisations […]
Publication
DCAF’s CSIRT Capacity Building Methodology: Lessons Learned from the Western Balkans
Authors
Year
- 2021
Description
- Computer emergency response teams (CSIRTs) are fundamentally important parts of any national cyberse…
DCAF’s CSIRT Capacity Building Methodology: Lessons Learned from the Western Balkans
Computer emergency response teams (CSIRTs) are fundamentally important parts of any national cybersecurity governance framework. This report aims to support the international efforts for effective CSIRT capacity-building. The first part of the report captures some of the main features of CSIRT capacity building and provides an overview of some of […]
Publication
Western Balkan CERT Cooperation
Authors
Year
- 2021
Description
- The objective of this report is to provide concrete proposals on possible approaches and models for…
Western Balkan CERT Cooperation
The objective of this report is to provide concrete proposals on possible approaches and models for enhanced cooperation among Western Balkans national CSIRTs based on the following main research questions: In which areas can national CSIRTs from the Western Balkans region cooperate with other nCSIRTs, but also other types of CSIRTs, from […]
Publication
Cybersecurity – DCAF’s Work on CERT Development
Authors
Year
- 2019
Description
- DCAF works with CERTs in the Western Balkans to help them develop their institutional capacities. In…
Cybersecurity – DCAF’s Work on CERT Development
DCAF works with CERTs in the Western Balkans to help them develop their institutional capacities. In a targeted intervention with the team, we assist them in better targeting their limited resources to do the best they can for their constituency. This involves working on identifying the team’s strengths, addressing its […]
Tool
CyberSeek
Authors
Year
- 2016
Description
- To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about suppl…
CyberSeek
To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market. Cybersecurity workers protect our most important and private information, from bank accounts to sensitive military communications. However, there is a dangerous shortage of cybersecurity workers in the United States […]
Tool
OSCE Cyber/ICT security Confidence-Building Measures Course
Authors
Year
- 2020
Description
- This course provides an overview of OSCE’s work in the field of cyber/ICT security. Over the c…
OSCE Cyber/ICT security Confidence-Building Measures Course
This course provides an overview of OSCE’s work in the field of cyber/ICT security. Over the course of three modules, you will learn why and how Confidence-Building Measures play and important role in promoting international security of and in the use of ICTs. The first module will serve as an […]
Publication
EU-US Cybersecurity Policy Coming Together: Recommendations for instruments to accomplish joint strategic goals
Authors
Year
- 2020
Description
- The need for more US–EU collaboration on cybersecurity policy has been identified by policymakers …
EU-US Cybersecurity Policy Coming Together: Recommendations for instruments to accomplish joint strategic goals
The need for more US–EU collaboration on cybersecurity policy has been identified by policymakers and diplomats from the EU and the US in their official Cyber Dialogues 2018 and 2019 as well as by international cybersecurity policy scholars. As the EU shapes its cybersecurity policies and fosters coordination among member […]
Publication
African Cyber Experts Fellowship: Lessons Learnt Report 2020
Authors
Year
- 2021
Description
- The purpose of this document is to draw out some of the key lessons learnt from the discussions held…
African Cyber Experts Fellowship: Lessons Learnt Report 2020
The purpose of this document is to draw out some of the key lessons learnt from the discussions held as part of the African Cyber Experts Fellowship programme. This is the first iteration of the document, but it is intended to be a living document which can be supplemented and […]
Publication
Future Series: Cybersecurity, Emerging Technology and Systemic Risk
Authors
Year
- 2020
Description
- This new Future Series report highlights the growing threat from hidden and systemic risks inherent …
Future Series: Cybersecurity, Emerging Technology and Systemic Risk
This new Future Series report highlights the growing threat from hidden and systemic risks inherent in the emerging technology environment, which will require significant change to the international and security communities’ response to cybersecurity.
Publication
Cyber Security and Cyber Resilience in East Africa
Authors
Year
- 2015
Description
- This paper analyzes continuities and discontinuities of collective efforts toward enhanced cyber sec…
Cyber Security and Cyber Resilience in East Africa
This paper analyzes continuities and discontinuities of collective efforts toward enhanced cyber security in Eastern Africa, with a particular focus on Kenya, Ethiopia and Somalia. Focusing on the challenges that have followed the contours of East Africa’s distinctive digital cultures, it challenges the view that cyber security and cyber resilience […]
Tool
The EU Toolbox for 5G security
Authors
Year
- 2020
Description
- The EU toolbox for 5G security is a set of robust and comprehensive measures for an EU coordinated a…
The EU Toolbox for 5G security
The EU toolbox for 5G security is a set of robust and comprehensive measures for an EU coordinated approach to secure 5G networks.
Tool
National Capabilities Assessment Framework
Authors
Year
- 2020
Description
- This report presents the work performed by ENISA to build a National Capabilities Assessment Framewo…
National Capabilities Assessment Framework
This report presents the work performed by ENISA to build a National Capabilities Assessment Framework (NCAF). The framework aims at providing Member States with a self-assessment of their level of maturity by assessing their NCSS objectives, that will help them enhance and build cybersecurity capabilities both at strategic and at […]