• Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 361-375 of 537 results

   
   
Publication

National Strategies: Interviews from behind the cover

Authors

Year

  • 2018

Description

  • The GFCE Working Group for Policy and Strategy presents information regarding the development of nat…

 

Tool

ITU 2020 Guidelines on Child Online Protection (COP)

Authors

Year

  • 2020

Description

  • The ITU Guidelines on Child Online Protection are a comprehensive set of recommendations for all r…

 

Publication

Cybersecurity Skills Development in the EU

Authors

Year

  • 2020

Description

  • This report focuses on the status of the cybersecurity education system and the inability to attract…

 

Tool

Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce

Authors

Year

  • 2014

Description

  • The strategic management of the workforce in any enterprise must be based upon a clear understanding…

 

Publication

Global Cyber Expertise Magazine – Issue 7 – April 2020

Authors

Year

  • 2020

Description

  • The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …

 

Tool

DMARC

Authors

Year

  • 2016

Description

  • The DMARC authentication tool is an important step in supporting the mission of the GCA. DMARC was d…

 

Tool

Cybersecurity Toolkit for Small Business

Authors

Year

  • 2019

Description

  • Did you know that 43 percent of cybercrime around the world is targeted at small businesses? It’s …

 

Tool

Quad9

Authors

Year

  • 2017

Description

  • Cybercriminals have manipulated the underpinnings of the Internet for years. It is easy for scammers…

 

Publication

3 Ways Governments Can Address Cybersecurity in the Post-Pandemic World

Authors

Year

  • 2020

Description

  • The COVID-19 pandemic has increased use of and reliance on the internet as people need to work and l…

 

Tool

Cyber 4 Healthcare

Authors

Year

  • 2020

Description

  • A targeted service for healthcare organizations fighting COVID19 to find, in one click, trusted, fre…

 

Publication

SIM3: Security Incident Management Maturity Model

Authors

Year

  • 2015

Description

  • The topic here is the Maturity of SecurityIncident Management(SIM) rather than just “CSIRT” whic…

 

Publication

Overview Of Existing Confidence Building Measures As Applied To Cyberspace

Authors

Year

  • 2020

Description

  • This paper was developed as part of the workplan of the Global Forum for Cyber Expertise’s (GFCE) …

 

Tool

HAMAGEN

Authors

Year

  • 2020

Description

  • HAMAGEN is an app that allows the identification of contacts between diagnosed patients and people w…

 

Publication

Lessons Learned: Cyber Incident Management Capacity Building

Authors

Year

  • 2020

Description

  • Capacity builders focus on their work in a number of different types of initiatives, from short-term…

 

Publication

Back to the New Normal

Authors

Year

  • 2020

Description

  • The recent changes in work habits require special attention to how we should re-adjust our routine. …

 

162

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.