Cyber Incident Management & Critical Information Protection

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 150 results

   
   
Publication

Cybersecurity Economics for Emerging Markets

Authors

Year

  • 2024

Description

  • In our increasingly interconnected world, where digital technologies are rapidly transforming multip…

 

Cybersecurity Economics for Emerging Markets

In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]

Publication

The Ransomware Playbook and How to Disrupt It

Authors

Year

  • 2025

Description

  • Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …

 

The Ransomware Playbook and How to Disrupt It

Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]

Publication

Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)

Authors

Year

  • 2020

Description

  • This guide has been developed so that any company that will use, or already uses, an IoT devices is …

 

Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)

This guide has been developed so that any company that will use, or already uses, an IoT devices is aware of the threats and circumstances that can lead to incidents. It also shows how to protect the device itself and its communications, and therefore the company’s information and business.

Publication

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

Authors

Year

  • 2017

Description

  • The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …

 

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]

Publication

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

Authors

Year

  • 2017

Description

  • This guide aims to help the entrepreneur to approach this process in a practical way with keys and s…

 

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

This guide aims to help the entrepreneur to approach this process in a practical way with keys and suggestions for assessing risks on a cost-benefit basis. The guide is structured in the following sections: Concepts where the terms used in risk management are introduced. Risk management, which includes the principles, […]

Publication

Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)

Authors

Year

  • 2024

Description

  • This cyber security guide aims to provide medium-sized companies with the necessary tools and strate…

 

Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)

This cyber security guide aims to provide medium-sized companies with the necessary tools and strategies to ensure the security and stability of their operations in the event of a cyber security crisis.

Tool

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

Authors

Year

  • 2025

Description

  • This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…

 

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”, a maturity baseline developed from the SIM3 model2 created by the Open CSIRT Foundation (OCF), an internationally recognized model for assessing the maturity of security teams. CSIRTAmericas Baseline serves to help organizations assess the readiness of their cyber incident […]

Tool

Geneva Dialogue – Cyber Quest

Authors

Year

  • 2025

Description

  • This online role-play simulation is designed for diplomats and professionals directly engaged in sha…

 

Geneva Dialogue – Cyber Quest

This online role-play simulation is designed for diplomats and professionals directly engaged in shaping global cybersecurity policy through the UN Open-ended Working Group (OEWG), and other related processes. The goal of this game is to connect cyber-norms and confidence-building measures (CBMs) to the practice through a practical a case of […]

Tool

Cyber Peace Tracer

Authors

Year

  • 2025

Description

  • The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI …

 

Cyber Peace Tracer

The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI to help raise awareness, mitigate threats and drive accountability. It also provides a high-level view of cyber threats and vulnerabilities. You can also find aggregated insights on the geographic distribution of incidents and the sectors most affected.

Tool

How to Build a Security Operations Center (on a budget)

Authors

Year

  • 2019

Description

  • With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…

 

How to Build a Security Operations Center (on a budget)

With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]

Publication

Private-public initiatives for cybersecurity: the case of Ukraine

Authors

Year

  • 2024

Description

  • Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian c…

 

Private-public initiatives for cybersecurity: the case of Ukraine

Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian cyber aggression since the invasion of February 2022. During the period, Ukraine has been provided with significant levels of cyber defence support by allied governments and private sector companies. Through expert interviews and roundtables, the […]

Tool

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

Authors

Year

  • 2024

Description

  • This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …

 

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]

Publication

Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online

Authors

Year

  • 2025

Description

  • The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 …

 

Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online

The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 presents the key findings from this year’s discussions held in Riyadh, Saudi Arabia. The report delves into the main concerns of cybersecurity and trust, drawing from a series of community consultations that shaped the […]

Publication

Unpacking Cloud Cybersecurity: A Guide for Policy Makers in Developing Countries

Authors

Year

  • 2024

Description

  • This report provides policymakers in developing countries with a conceptual framework to understand …

 

Unpacking Cloud Cybersecurity: A Guide for Policy Makers in Developing Countries

This report provides policymakers in developing countries with a conceptual framework to understand the key challenges and benefits of cloud adoption for cybersecurity risk management, as well as practical recommendations on how to enhance cyber resilience when procuring cloud services in the public sector. It encourages policymakers to support hybrid, […]

Publication

Guidelines and Companion Guide on Securing AI Systems

Authors

Year

  • 2024

Description

  • On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Secur…

 

Guidelines and Companion Guide on Securing AI Systems

On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Securing AI Systems and the accompanying Companion Guide to address cybersecurity risks associated with artificial intelligence (AI). These resources aim to ensure AI systems are secure by design and default, prioritizing safety, security, and responsible […]

135

more brilliant tools and publications this way

1 2 3 10

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.