Publication
International Strategy to Better Protect the Financial System Against Cyber Threats
Authors
Year
- 2020
Description
- In February 2016, a few months after Carnegie began its work on this project, a cyber attack shook t…
International Strategy to Better Protect the Financial System Against Cyber Threats
In February 2016, a few months after Carnegie began its work on this project, a cyber attack shook the finance world. Hackers had targeted SWIFT, the global financial system’s main information network, trying to steal 1 billion U.S. dollars, nearly 0.50 percent of Bangladesh’s GDP, from the Bangladeshi central bank […]
Tool
Cyber Resilience and Financial Organizations: A Capacity-building Tool Box
Authors
Year
- 2019
Description
- To enhance the cyber resilience of financial institutions, the Carnegie Endowment for International …
Cyber Resilience and Financial Organizations: A Capacity-building Tool Box
To enhance the cyber resilience of financial institutions, the Carnegie Endowment for International Peace has partnered with the International Monetary Fund, the SWIFT Institute—the original sponsor of this project, the Financial Services Information Sharing and Analysis Center (FS-ISAC), Standard Chartered, the Cyber Readiness Institute, and the Global Cyber Alliance to […]
Publication
Safeguarding our Healthcare Systems: A Global Framework for Cybersecurity
Authors
Year
- 2020
Description
- Digital technology has transformed health systems, helping to reduce costs and improve the managemen…
Safeguarding our Healthcare Systems: A Global Framework for Cybersecurity
Digital technology has transformed health systems, helping to reduce costs and improve the management of patient care. But the rapid global adoption of emerging technologies in healthcare has led to increased vulnerability to cyber threats that can erode patient trust and compromise the safety and confidentiality of patient data. The […]
Publication
Gender Approaches to Cybersecurity: Design, Defence and Response
Authors
Year
- 2021
Description
- “Gender Approaches to Cybersecurity” explores how gender norms shape specific activities…
Gender Approaches to Cybersecurity: Design, Defence and Response
“Gender Approaches to Cybersecurity” explores how gender norms shape specific activities pertaining to cybersecurity design, defence and response. In each of these three pillars, the research identifies distinct dimensions of cyber-related activities that have gendered implications and, thus, need to be considered from a gender perspective. The report proposes recommendations […]
Publication
Global Cyber Expertise Magazine – Issue 8 – November 2020
Authors
Year
- 2020
Description
- The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …
Global Cyber Expertise Magazine – Issue 8 – November 2020
The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. In this edition, we see a number of […]
Tool
Directions – Cyber Digital Europe Blog
Authors
Year
- 2020
Description
- Directions is an independent platform* for exchanging and discussing ideas – old and new ones – …
Directions – Cyber Digital Europe Blog
Directions is an independent platform* for exchanging and discussing ideas – old and new ones – on Europe’s place in the digital world and world views on digital Europe. Through analysis, commentaries and interviews, Directions aims to stimulate a European debate and showcase the diversity of voices about the present […]
Publication
Cybersecurity Considerations for the Democratic Process for Latin America and the Caribbean
Authors
Year
- 2020
Description
- This document is intended to raise awareness among OAS member states on the processes surrounding an…
Cybersecurity Considerations for the Democratic Process for Latin America and the Caribbean
This document is intended to raise awareness among OAS member states on the processes surrounding and sustaining our democracies. More specifically, it is intended to focus attention on the cybersecurity implications that may affect the processes that support democracy and, in particular, the electoral processes. Even if the actual democratic […]
Publication
Reviewing cybersecurity capacity in a COVID-19 environment
Authors
Year
- 2020
Description
- The launch and setup in early 2020 of the new Cybersecurity Capacity Centre for Southern Africa (C3S…
Reviewing cybersecurity capacity in a COVID-19 environment
The launch and setup in early 2020 of the new Cybersecurity Capacity Centre for Southern Africa (C3SA) at the University of Cape Town, the latest member of the Constellation of Cybersecurity Capacity Research Centres, coincided with the beginning of the Coronavirus pandemic. For C3SA and the Oxfordbased Global Cyber Security […]
Publication
Improving Cybersecurity Awareness in Underserved Populations
Authors
Year
- 2019
Description
- This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highli…
Improving Cybersecurity Awareness in Underserved Populations
This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highlights research indicating that “underserved” residents in San Francisco, California— including low-income residents, seniors, and foreign language speakers—face higher-than-average risks of being victims of cyber attacks. They are less likely to know whether they have even been […]
Publication
The Saudi Cybersecurity Workforce Development (SCyWF)
Authors
Year
- 2020
Description
- The Saudi National Cybersecurity Authority (NCA) is leading the national effort to protect the count…
The Saudi Cybersecurity Workforce Development (SCyWF)
The Saudi National Cybersecurity Authority (NCA) is leading the national effort to protect the country’s cyber space. This mission requires a qualified national cybersecurity workforce capable of carrying out all types of cybersecurity work. The NCA’s mandate was issued by Royal Order number 6801, dated October 31, 2017. It includes […]
Publication
Cyber-risk Oversight Handbook for Corporate Boards
Authors
Year
- 2019
Description
- Cyber-attacks are the fastest growing, and perhaps most dangerous, threat facing organizations today…
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-attacks are the fastest growing, and perhaps most dangerous, threat facing organizations today. Boards of Directors must take a leading role in oversight of the safety of their company’s cyber systems. However, a recent study from the Organization of American States and the InterAmerican Development Bank found corporate boards in Latin […]
Publication
Cybersecurity Education: Planning for the Future Through Workforce Development
Authors
Year
- 2020
Description
- As the number of malicious activities in cyberspace continues to rise, the need for a workforce trai…
Cybersecurity Education: Planning for the Future Through Workforce Development
As the number of malicious activities in cyberspace continues to rise, the need for a workforce trained in cybersecurity is a necessity. The indispensable skills for such a workforce include the ability to optimally design and operate applications and systems with the capacity to identify and respond to cyber threats, […]
Publication
Building cyber security awareness in a developing country: Lessons from Myanmar
Authors
Year
- 2020
Description
- The paper discusses the arguments for inclusion of cybersecurity awareness building in development a…
Building cyber security awareness in a developing country: Lessons from Myanmar
The paper discusses the arguments for inclusion of cybersecurity awareness building in development assistance programs. We note that cybersecurity awareness building can strengthen the resilience of productivity-enhancing services, such as mobile banking and e-payment systems, and benefit economic growth. We develop a typology of cybersecurity strategies involving government, the private […]