Cyber Incident Management & Critical Information Protection

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 31-45 of 150 results

   
   
Publication

Public-Private Partnerships (PPPs) to Combat Ransomware: an Inquiry into Three Case Studies and Best Practices

Authors

Year

  • 2024

Description

  • The Institute for Security and Technology (IST) conducted this research with the support of the Glob…

 

Publication

Best Practices for Cyber Crisis Management

Authors

Year

  • 2024

Description

  • This study highlights the complexities behind the notion of cyber crisis and the degree of subjectiv…

 

Publication

Self- and Co-regulation in Cybercrime, Cybersecurity and National Security

Year

  • 2015

Description

  • Offers unique insights into the role of the Internet industry in combating cybercrime, improving cyb…

 

Publication

Ransomware Incident Response Plan

Authors

Year

  • 2022

Description

  • Ransomware can have a very disruptive effect on organisations. And what do you do then? Or how can …

 

Publication

The NIST Cybersecurity Framework 2.0

Authors

Year

  • 2024

Description

  • The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and o…

 

Publication

Journal of Cyber Policy

Authors

Year

  • 2016

Description

  • The Journal of Cyber Policy has a strong emphasis on topics that are international in scope, and can…

 

Publication

Intrusions on State Digital Infrastructure in North Macedonia: Digital Human Rights Impact Analysis

Authors

Year

  • 2022

Description

  • This paper is focused on the protection of digital critical infrastructure, intrusions, and the imp…

 

Publication

Cybersecurity Ecosystem Report, Western Balkans Emerging Cyber threats

Authors

Year

  • 2022

Description

  • This Cybersecurity Ecosystem Report maps cyber threats in the Western Balkans, identifying key risks…

 

Publication

Montenegro Elections Cybersecurity Report

Authors

Year

  • 2023

Description

  • This assessment offers an overview of the election management ICT infrastructure in Montenegro and p…

 

Publication

Protecting Transnational Critical Information Infrastructure: Vitality, Vulnerability and Diplomacy

Authors

Year

  • 2023

Description

  • This paper considers how the governance of transnational critical information infrastructure (CII) c…

 

Publication

Western Balkan CERT Cooperation

Year

  • 2021

Description

  • This publication focuses on providing concrete proposals for enhancing cooperation among national Co…

 

Publication

Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders

Authors

Year

  • 2024

Description

  • This Guidebook is intended to help, in particular, new employees of Computer Security Incident Respo…

 

Publication

‘Leapfrogging’ or ‘lagging’?: highlighting critical information infrastructure protection challenges and opportunities in Egypt and Nigeria

Year

  • 2024

Description

  • Emerging economies are experiencing dramatic rises in internet penetration, along with an expansion …

 

Publication

Ghana : A Case Study in Strengthening Cyber Resilience

Authors

Year

  • 2023

Description

  • The case study of Ghana demonstrates that forward-looking investments and policy initiatives based o…

 

Publication

Mapping the World’s Critical Infrastructure Sectors

Authors

Year

  • 2023

Description

  • This paper examines the policy documents of 193 United Nations member states and Taiwan. It analyzes…

 

105

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.