Tool
Align National Campaigns
Authors
Year
- 2017
Description
- Cooperation, alignment, and coordination with others is beneficial. In planning and organising an aw…
Tool
IBM X-Force Exchange
Authors
Year
- 2015
Description
- IBM® X-Force Exchange is a cloud-based, threat intelligence sharing platform that you can use to ra…
Tool
The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers
Authors
Year
- 2017
Description
- Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. …
Tool
GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)
Authors
Year
- 2017
Description
- Some elements of ICT have become critical for national security. These elements form the Critical …
Tool
Produce and Present Trusted Metrics about Systemic Risk Conditions
Authors
Year
- 2017
Description
- A statistics platform, featuring metrics and data visualisation, allows for the measurement of key i…
Tool
Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks
Authors
Year
- 2017
Description
- Internet networks are replete with systemic vulnerabilities. CERTs and other trusted operators req…
Publication
Harnessing the Internet of Things for Global Development
Authors
Year
- 2016
Description
- This report explores the current use and potential of Internet of Things (IoT) technologies in tackl…
Publication
An Internet of Things Reference of Architecture
Authors
Year
- 2016
Description
- The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices…
Publication
IoT Security Standards Gap Analysis
Authors
Year
- 2019
Description
- This study analyses the gaps and provides guidelines for, in particular, the development or repositi…
Publication
IoT Security Whitepaper 2018
Authors
Year
- 2018
Description
- In February 2017, Huawei released the white paper Building a Trusted and Managed IoT World with Inst…
Publication
International Cyber Norms: Legal, Policy and Industry Perspectives
Authors
Year
- 2016
Description
- The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a serie…
Publication
Confidence Building Measures and International Cybersecurity
Authors
Year
- 2013
Description
- The meeting in Zurich took place at an important moment. Recent events have shown that much remains …
Publication
Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary
Authors
Year
- 2017
Description
- This publication contains a commentary on the voluntary, non-binding norms of responsible State beha…
Publication
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
Authors
Year
- 2017
Description
- The most comprehensive guide for policy advisors and legal experts on how existing International Law…