Publication
Why Gender Matters in International Cyber Security
Authors
Year
- 2020
Description
- Gender matters in international cyber security. It shapes and influences our online behaviour; deter…
Why Gender Matters in International Cyber Security
Gender matters in international cyber security. It shapes and influences our online behaviour; determines access and power; and is a factor in vulnerability, whether real or perceived. As a result, malicious cyber operations can differently impact people based on their gender identity or expression. Online gender dynamics have been shown […]
Publication
National Strategies: Interviews from behind the cover
Authors
Year
- 2018
Description
- The GFCE Working Group for Policy and Strategy presents information regarding the development of nat…
National Strategies: Interviews from behind the cover
The GFCE Working Group for Policy and Strategy presents information regarding the development of national cyber strategies through interviews conducted with cybersecurity specialists in Norway, Mexico and Senegal. These three GFCE Member countries develop their strategies in different contexts. Norway utilizes a very open approach to develop their strategy. Mexico […]
Tool
ITU 2020 Guidelines on Child Online Protection (COP)
Authors
Year
- 2020
Description
- The ITU Guidelines on Child Online Protection are a comprehensive set of recommendations for all r…
ITU 2020 Guidelines on Child Online Protection (COP)
The ITU Guidelines on Child Online Protection are a comprehensive set of recommendations for all relevant stakeholders on how to contribute to the development of a safe and empowering online environment for children and young people.
Publication
Cybersecurity Skills Development in the EU
Authors
Year
- 2020
Description
- This report focuses on the status of the cybersecurity education system and the inability to attract…
Cybersecurity Skills Development in the EU
This report focuses on the status of the cybersecurity education system and the inability to attract more students in studying cybersecurity and to produce graduates with “the right cybersecurity knowledge and skills”. It argues that many of the current issues in cybersecurity education could be lessened by redesigning educational and […]
Tool
Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce
Authors
Year
- 2014
Description
- The strategic management of the workforce in any enterprise must be based upon a clear understanding…
Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce
The strategic management of the workforce in any enterprise must be based upon a clear understanding of, and linkage to, enterprise strategy. In the case of securing data, systems and infrastructure, this means that workforce planning must align with a comprehensive cybersecurity strategy. While this field has often been considered […]
Publication
Global Cyber Expertise Magazine – Issue 7 – April 2020
Authors
Year
- 2020
Description
- The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …
Global Cyber Expertise Magazine – Issue 7 – April 2020
The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. As we celebrate our 5th Anniversary in April […]
Tool
DMARC
Authors
Year
- 2016
Description
- The DMARC authentication tool is an important step in supporting the mission of the GCA. DMARC was d…
DMARC
The DMARC authentication tool is an important step in supporting the mission of the GCA. DMARC was developed as a collaborative effort to fight phishing and other dangerous email scams. Source – DMARC website
Tool
Cybersecurity Toolkit for Small Business
Authors
Year
- 2019
Description
- Did you know that 43 percent of cybercrime around the world is targeted at small businesses? It’s …
Cybersecurity Toolkit for Small Business
Did you know that 43 percent of cybercrime around the world is targeted at small businesses? It’s a shocking fact. Many businesses are forced to shut down after an attack due to the impact. Fortunately, there are basic steps that all businesses can take to put safeguards in place and […]
Tool
Quad9
Authors
Year
- 2017
Description
- Cybercriminals have manipulated the underpinnings of the Internet for years. It is easy for scammers…
Quad9
Cybercriminals have manipulated the underpinnings of the Internet for years. It is easy for scammers to trick users by creating websites that appear to be legitimate, familiar company websites, but they are not because they have a different IP address – something that users would find very hard to confirm. […]
Publication
3 Ways Governments Can Address Cybersecurity in the Post-Pandemic World
Authors
Year
- 2020
Description
- The COVID-19 pandemic has increased use of and reliance on the internet as people need to work and l…
3 Ways Governments Can Address Cybersecurity in the Post-Pandemic World
The COVID-19 pandemic has increased use of and reliance on the internet as people need to work and learn from home. Cyberattacks have also increased worldwide during the crisis. Governments can address cybersecurity in the post-pandemic world if they work together to adjust national frameworks, increase international cooperation and unify […]
Tool
Cyber 4 Healthcare
Authors
Year
- 2020
Description
- A targeted service for healthcare organizations fighting COVID19 to find, in one click, trusted, fre…
Cyber 4 Healthcare
A targeted service for healthcare organizations fighting COVID19 to find, in one click, trusted, free cybersecurity assistance, provided by qualified and reputable companies. The CyberPeace Institute’smission is to protect people from cyberattacks, conduct fact-based analysis and promote policy discussions based on data.
Publication
SIM3: Security Incident Management Maturity Model
Authors
Year
- 2015
Description
- The topic here is the Maturity of SecurityIncident Management(SIM) rather than just “CSIRT” whic…
SIM3: Security Incident Management Maturity Model
The topic here is the Maturity of SecurityIncident Management(SIM) rather than just “CSIRT” which by virtue of the name is about “response” primarily. SIM has four major pillars: Prevention Detection Resolutiono Quality control & feedback The primary scope here is IT & information security incidents: incidents thatare limited to computers, […]
Publication
Overview Of Existing Confidence Building Measures As Applied To Cyberspace
Authors
Year
- 2020
Description
- This paper was developed as part of the workplan of the Global Forum for Cyber Expertise’s (GFCE) …
Overview Of Existing Confidence Building Measures As Applied To Cyberspace
This paper was developed as part of the workplan of the Global Forum for Cyber Expertise’s (GFCE) Task Force on CBM and Norms Implementation & Cyber Diplomacy, under the direction of the Task Force Leads Kaja Ciglic and Nikolas Ott. They wish to thank for their contributions or comments the […]
Tool
HAMAGEN
Authors
Year
- 2020
Description
- HAMAGEN is an app that allows the identification of contacts between diagnosed patients and people w…
HAMAGEN
HAMAGEN is an app that allows the identification of contacts between diagnosed patients and people who came in contact with them in the 14 days prior to the patient’s diagnosis of the disease.
Publication
Lessons Learned: Cyber Incident Management Capacity Building
Authors
Year
- 2020
Description
- Capacity builders focus on their work in a number of different types of initiatives, from short-term…
Lessons Learned: Cyber Incident Management Capacity Building
Capacity builders focus on their work in a number of different types of initiatives, from short-term maturity and capability assessments and technical training, to providing long-term engagement and advice. These projects often face challenges, which include a lack of awareness of other, existing initiatives, or lack of long-term funding which […]