Warning: Undefined array key "_sft_region" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 87

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 114

Warning: Attempt to read property "term_id" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 117


Warning: Undefined array key "_sft_region" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_region" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_region" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_region" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_region" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 361-375 of 538 results

   
   
Publication

Why Gender Matters in International Cyber Security

Authors

Year

  • 2020

Description

  • Gender matters in international cyber security. It shapes and influences our online behaviour; deter…

 

Why Gender Matters in International Cyber Security

Gender matters in international cyber security. It shapes and influences our online behaviour; determines access and power; and is a factor in vulnerability, whether real or perceived. As a result, malicious cyber operations can differently impact people based on their gender identity or expression. Online gender dynamics have been shown […]

Publication

National Strategies: Interviews from behind the cover

Authors

Year

  • 2018

Description

  • The GFCE Working Group for Policy and Strategy presents information regarding the development of nat…

 

National Strategies: Interviews from behind the cover

The GFCE Working Group for Policy and Strategy presents information regarding the development of national cyber strategies through interviews conducted with cybersecurity specialists in Norway, Mexico and Senegal. These three GFCE Member countries develop their strategies in different contexts. Norway utilizes a very open approach to develop their strategy. Mexico […]

Tool

ITU 2020 Guidelines on Child Online Protection (COP)

Authors

Year

  • 2020

Description

  • The ITU Guidelines on Child Online Protection are a comprehensive set of recommendations for all r…

 

ITU 2020 Guidelines on Child Online Protection (COP)

The ITU Guidelines on Child Online Protection are a comprehensive set of recommendations for all relevant stakeholders on how to contribute to the development of a safe and empowering online environment for children and young people.  

Publication

Cybersecurity Skills Development in the EU

Authors

Year

  • 2020

Description

  • This report focuses on the status of the cybersecurity education system and the inability to attract…

 

Cybersecurity Skills Development in the EU

This report focuses on the status of the cybersecurity education system and the inability to attract more students in studying cybersecurity and to produce graduates with “the right cybersecurity knowledge and skills”. It argues that many of the current issues in cybersecurity education could be lessened by redesigning educational and […]

Tool

Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce

Authors

Year

  • 2014

Description

  • The strategic management of the workforce in any enterprise must be based upon a clear understanding…

 

Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce

The strategic management of the workforce in any enterprise must be based upon a clear understanding of, and linkage to, enterprise strategy. In the case of securing data, systems and infrastructure, this means that workforce planning must align with a comprehensive cybersecurity strategy. While this field has often been considered […]

Publication

Global Cyber Expertise Magazine – Issue 7 – April 2020

Authors

Year

  • 2020

Description

  • The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …

 

Global Cyber Expertise Magazine – Issue 7 – April 2020

The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. As we celebrate our 5th Anniversary in April […]

Tool

DMARC

Authors

Year

  • 2016

Description

  • The DMARC authentication tool is an important step in supporting the mission of the GCA. DMARC was d…

 

DMARC

The DMARC authentication tool is an important step in supporting the mission of the GCA. DMARC was developed as a collaborative effort to fight phishing and other dangerous email scams. Source – DMARC website

Tool

Cybersecurity Toolkit for Small Business

Authors

Year

  • 2019

Description

  • Did you know that 43 percent of cybercrime around the world is targeted at small businesses? It’s …

 

Cybersecurity Toolkit for Small Business

Did you know that 43 percent of cybercrime around the world is targeted at small businesses? It’s a shocking fact. Many businesses are forced to shut down after an attack due to the impact. Fortunately, there are basic steps that all businesses can take to put safeguards in place and […]

Tool

Quad9

Authors

Year

  • 2017

Description

  • Cybercriminals have manipulated the underpinnings of the Internet for years. It is easy for scammers…

 

Quad9

Cybercriminals have manipulated the underpinnings of the Internet for years. It is easy for scammers to trick users by creating websites that appear to be legitimate, familiar company websites, but they are not because they have a different IP address – something that users would find very hard to confirm. […]

Publication

3 Ways Governments Can Address Cybersecurity in the Post-Pandemic World

Authors

Year

  • 2020

Description

  • The COVID-19 pandemic has increased use of and reliance on the internet as people need to work and l…

 

3 Ways Governments Can Address Cybersecurity in the Post-Pandemic World

The COVID-19 pandemic has increased use of and reliance on the internet as people need to work and learn from home. Cyberattacks have also increased worldwide during the crisis. Governments can address cybersecurity in the post-pandemic world if they work together to adjust national frameworks, increase international cooperation and unify […]

Tool

Cyber 4 Healthcare

Authors

Year

  • 2020

Description

  • A targeted service for healthcare organizations fighting COVID19 to find, in one click, trusted, fre…

 

Cyber 4 Healthcare

A targeted service for healthcare organizations fighting COVID19 to find, in one click, trusted, free cybersecurity assistance, provided by qualified and reputable companies. The CyberPeace Institute’smission is to protect people from cyberattacks, conduct fact-based analysis and promote policy discussions based on data.

Publication

SIM3: Security Incident Management Maturity Model

Authors

Year

  • 2015

Description

  • The topic here is the Maturity of SecurityIncident Management(SIM) rather than just “CSIRT” whic…

 

SIM3: Security Incident Management Maturity Model

The topic here is the Maturity of SecurityIncident Management(SIM) rather than just “CSIRT” which by virtue of the name is about “response” primarily. SIM has four major pillars: Prevention Detection Resolutiono Quality control & feedback The primary scope here is IT & information security incidents: incidents thatare limited to computers, […]

Publication

Overview Of Existing Confidence Building Measures As Applied To Cyberspace

Authors

Year

  • 2020

Description

  • This paper was developed as part of the workplan of the Global Forum for Cyber Expertise’s (GFCE) …

 

Overview Of Existing Confidence Building Measures As Applied To Cyberspace

This paper was developed as part of the workplan of the Global Forum for Cyber Expertise’s (GFCE) Task Force on CBM and Norms Implementation & Cyber Diplomacy, under the direction of the Task Force Leads Kaja Ciglic and Nikolas Ott. They wish to thank for their contributions or comments the […]

Tool

HAMAGEN

Authors

Year

  • 2020

Description

  • HAMAGEN is an app that allows the identification of contacts between diagnosed patients and people w…

 

HAMAGEN

HAMAGEN is an app that allows the identification of contacts between diagnosed patients and people who came in contact with them in the 14 days prior to the patient’s diagnosis of the disease.

Publication

Lessons Learned: Cyber Incident Management Capacity Building

Authors

Year

  • 2020

Description

  • Capacity builders focus on their work in a number of different types of initiatives, from short-term…

 

Lessons Learned: Cyber Incident Management Capacity Building

Capacity builders focus on their work in a number of different types of initiatives, from short-term maturity and capability assessments and technical training, to providing long-term engagement and advice. These projects often face challenges, which include a lack of awareness of other, existing initiatives, or lack of long-term funding which […]

163

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.