Publication
Back to the New Normal
Authors
Year
- 2020
Description
- The recent changes in work habits require special attention to how we should re-adjust our routine. …
Back to the New Normal
The recent changes in work habits require special attention to how we should re-adjust our routine. It is expected that: a. There will be tools and methods we will choose to discard and go back to former security measures that were kept prior to the Pandemic. b. There will be […]
Publication
Participation in a ‘Marketplace’ of Cybersecurity Solutions for the Coronavirus Crisis
Authors
Year
- 2020
Description
- The coronavirus crisis has created a new situation worldwide. Organizations have been forced to redu…
Participation in a ‘Marketplace’ of Cybersecurity Solutions for the Coronavirus Crisis
The coronavirus crisis has created a new situation worldwide. Organizations have been forced to reduce their staff at the workplace. As a result, they have greatly expanded their use of digital platforms, remote access, cloud services and connectivity. These have also expanded their cyber risk. The cyber industry has a […]
Publication
National Resilience Technologies
Authors
Year
- 2020
Description
- The covid-19 crisis and it’s national responses have brought a sharper understanding of the ro…
National Resilience Technologies
The covid-19 crisis and it’s national responses have brought a sharper understanding of the role of technology in national resilience. Technologies can help nations deal with crisis situation in two main ways: a. maintain continuity of essential services and the economy at large even under extreme conditions. b. Take action […]
Publication
CERT-IL’s Recommendation on How to Use the “Zoom” Application Safely
Authors
Year
- 2020
Description
- In light of the corona virus epidemic, many organizations turned to remote work methods (WFH). Many …
CERT-IL’s Recommendation on How to Use the “Zoom” Application Safely
In light of the corona virus epidemic, many organizations turned to remote work methods (WFH). Many of them uses collaboration on-line applications, the most popular on-lineapplication is “Zoom”. This document contains recommendations for safer usage of the application.
Publication
Designating Cybersecurity Firms as Emergency Service Providers During the Corona Crisis
Authors
Year
- 2020
Description
- The Israel National Cyber Directorate (INCD) continues to fulfill its mandate of ensuring national c…
Designating Cybersecurity Firms as Emergency Service Providers During the Corona Crisis
The Israel National Cyber Directorate (INCD) continues to fulfill its mandate of ensuring national cybersecurity, during the Corona crisis. As emergency orders for reducing social contact came into force in Israel, the INCD led the way for exempting cybersecurity firms from its provisions, in order to enable continuity of cybersecurity […]
Publication
Financial-Cyber Resilience and Business Continuity Key Guidelines
Authors
Year
- 2020
Description
- The ongoing Coronavirus crisismight take long toresolve. Meanwhile, more and more homes become actua…
Financial-Cyber Resilience and Business Continuity Key Guidelines
The ongoing Coronavirus crisismight take long toresolve. Meanwhile, more and more homes become actual work places, as lockdowns challenge business continuity all around the globe.This fast-growing phenomenon directly impacts various infrastructures and infosystems that were originally designed to meet certain demands, which have probably been exceeded by now. However, it […]
Publication
Unpacking the GGE’s Framework on Responsible State Behaviour: Cyber Norms
Authors
Year
- 2020
Description
- At the UN First Committee, two processes—the UN Group of Governmental Experts (GGE) and the Open-e…
Unpacking the GGE’s Framework on Responsible State Behaviour: Cyber Norms
At the UN First Committee, two processes—the UN Group of Governmental Experts (GGE) and the Open-ended Working Group—are currently exploring the same question: responsible state behaviour in cyberspace. This term comes from a 2015 report by the previous GGE, which defines it according to a framework of four components: 1) […]
Publication
UN First Committee Processes on Responsible State Behaviour in Cyberspace: An Explainer
Authors
Year
- 2020
Description
- In late 2018, the UN First Committee established two parallel processes to discuss responsible state…
UN First Committee Processes on Responsible State Behaviour in Cyberspace: An Explainer
In late 2018, the UN First Committee established two parallel processes to discuss responsible state behaviour in cyberspace – the UN Group of Governmental Experts (GGE) and the Open Ended Working Group (OEWG). The outcomes of these processes may end up having a significant influence on trends and policies in […]
Publication
Unpacking the GGE’s Framework on Responsible State Behaviour: Capacity Building
Authors
Year
- 2020
Description
- At the UN First Committee, two processes—the UN Group of Governmental Experts (GGE) and the Open-e…
Unpacking the GGE’s Framework on Responsible State Behaviour: Capacity Building
At the UN First Committee, two processes—the UN Group of Governmental Experts (GGE) and the Open-ended Working Group—are currently exploring the same question: responsible state behaviour in cyberspace. This term comes from a 2015 report by the previous GGE, which defines it according to a framework of four components: 1) […]
Publication
Unpacking the GGE’s framework on Responsible State Behaviour: Confidence Building Measures
Authors
Year
- 2020
Description
- At the UN First Committee, two processes—the UN Group of Governmental Experts (GGE) and the Open-e…
Unpacking the GGE’s framework on Responsible State Behaviour: Confidence Building Measures
At the UN First Committee, two processes—the UN Group of Governmental Experts (GGE) and the Open-ended Working Group—are currently exploring the same question: responsible state behaviour in cyberspace. This term comes from a 2015 report by the previous GGE, which defines it according to a framework of four components: 1) […]
Tool
Cyber Strategy Development & Implementation (CSDI) Framework
Authors
Year
- 2020
Description
- MITRE’s Cyber Strategy Development and Implementation (CSDI) Framework draws from the best pra…
Cyber Strategy Development & Implementation (CSDI) Framework
MITRE’s Cyber Strategy Development and Implementation (CSDI) Framework draws from the best practices of more than 18 US, International, and Industry models. It uses a combination of design thinking activities, threat/opportunity/resources contextualization, and a lens of eight key cyber capacity areas in a four-phase strategy approach to assessing cyber needs […]
Tool
ITU Global Cybersecurity Index (GCI) v3
Authors
Year
- 2017
Description
- The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…
ITU Global Cybersecurity Index (GCI) v3
The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]
Tool
ITU Global Cybersecurity Index (GCI) v2
Authors
Year
- 2015
Description
- The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…
ITU Global Cybersecurity Index (GCI) v2
The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]
Tool
ITU Global Cybersecurity Index (GCI) v1
Authors
Year
- 2013
Description
- The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…
ITU Global Cybersecurity Index (GCI) v1
The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]
Tool
ITU Global Cybersecurity Index (GCI) v4
Authors
Year
- 2019
Description
- The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…
ITU Global Cybersecurity Index (GCI) v4
The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]