Publication
Cybersecurity Economics for Emerging Markets
Authors
Year
- 2024
Description
- In our increasingly interconnected world, where digital technologies are rapidly transforming multip…
Cybersecurity Economics for Emerging Markets
In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]
Publication
The Ransomware Playbook and How to Disrupt It
Authors
Year
- 2025
Description
- Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …
The Ransomware Playbook and How to Disrupt It
Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]
Publication
Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)
Authors
Year
- 2020
Description
- This guide has been developed so that any company that will use, or already uses, an IoT devices is …
Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)
This guide has been developed so that any company that will use, or already uses, an IoT devices is aware of the threats and circumstances that can lead to incidents. It also shows how to protect the device itself and its communications, and therefore the company’s information and business.
Publication
How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)
Authors
Year
- 2017
Description
- The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …
How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)
The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]
Publication
Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)
Authors
Year
- 2017
Description
- This guide aims to help the entrepreneur to approach this process in a practical way with keys and s…
Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)
This guide aims to help the entrepreneur to approach this process in a practical way with keys and suggestions for assessing risks on a cost-benefit basis. The guide is structured in the following sections: Concepts where the terms used in risk management are introduced. Risk management, which includes the principles, […]
Publication
Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)
Authors
Year
- 2024
Description
- This cyber security guide aims to provide medium-sized companies with the necessary tools and strate…
Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)
This cyber security guide aims to provide medium-sized companies with the necessary tools and strategies to ensure the security and stability of their operations in the event of a cyber security crisis.
Tool
CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs
Authors
Year
- 2025
Description
- This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…
CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs
This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”, a maturity baseline developed from the SIM3 model2 created by the Open CSIRT Foundation (OCF), an internationally recognized model for assessing the maturity of security teams. CSIRTAmericas Baseline serves to help organizations assess the readiness of their cyber incident […]
Tool
Geneva Dialogue – Cyber Quest
Authors
Year
- 2025
Description
- This online role-play simulation is designed for diplomats and professionals directly engaged in sha…
Geneva Dialogue – Cyber Quest
This online role-play simulation is designed for diplomats and professionals directly engaged in shaping global cybersecurity policy through the UN Open-ended Working Group (OEWG), and other related processes. The goal of this game is to connect cyber-norms and confidence-building measures (CBMs) to the practice through a practical a case of […]
Tool
Cyber Peace Tracer
Authors
Year
- 2025
Description
- The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI …
Cyber Peace Tracer
The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI to help raise awareness, mitigate threats and drive accountability. It also provides a high-level view of cyber threats and vulnerabilities. You can also find aggregated insights on the geographic distribution of incidents and the sectors most affected.
Tool
How to Build a Security Operations Center (on a budget)
Authors
Year
- 2019
Description
- With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…
How to Build a Security Operations Center (on a budget)
With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]
Publication
Private-public initiatives for cybersecurity: the case of Ukraine
Authors
Year
- 2024
Description
- Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian c…
Private-public initiatives for cybersecurity: the case of Ukraine
Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian cyber aggression since the invasion of February 2022. During the period, Ukraine has been provided with significant levels of cyber defence support by allied governments and private sector companies. Through expert interviews and roundtables, the […]
Tool
From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies
Authors
Year
- 2024
Description
- This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …
From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies
This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]
Publication
Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online
Authors
Year
- 2025
Description
- The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 …
Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online
The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 presents the key findings from this year’s discussions held in Riyadh, Saudi Arabia. The report delves into the main concerns of cybersecurity and trust, drawing from a series of community consultations that shaped the […]
Publication
Unpacking Cloud Cybersecurity: A Guide for Policy Makers in Developing Countries
Authors
Year
- 2024
Description
- This report provides policymakers in developing countries with a conceptual framework to understand …
Unpacking Cloud Cybersecurity: A Guide for Policy Makers in Developing Countries
This report provides policymakers in developing countries with a conceptual framework to understand the key challenges and benefits of cloud adoption for cybersecurity risk management, as well as practical recommendations on how to enhance cyber resilience when procuring cloud services in the public sector. It encourages policymakers to support hybrid, […]
Publication
Guidelines and Companion Guide on Securing AI Systems
Authors
Year
- 2024
Description
- On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Secur…
Guidelines and Companion Guide on Securing AI Systems
On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Securing AI Systems and the accompanying Companion Guide to address cybersecurity risks associated with artificial intelligence (AI). These resources aim to ensure AI systems are secure by design and default, prioritizing safety, security, and responsible […]