Tool
Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse
Authors
Year
- 2021
Description
- Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have pr…
Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse
Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have produced this ‘by tech, for tech’ guide to operationalising the Voluntary Principles.
Tool
CyberSeek
Authors
Year
- 2016
Description
- To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about suppl…
CyberSeek
To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market. Cybersecurity workers protect our most important and private information, from bank accounts to sensitive military communications. However, there is a dangerous shortage of cybersecurity workers in the United States […]
Publication
Global Cyber Expertise Magazine – Issue 8 – November 2020
Authors
Year
- 2020
Description
- The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …
Global Cyber Expertise Magazine – Issue 8 – November 2020
The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. In this edition, we see a number of […]
Tool
Directions – Cyber Digital Europe Blog
Authors
Year
- 2020
Description
- Directions is an independent platform* for exchanging and discussing ideas – old and new ones – …
Directions – Cyber Digital Europe Blog
Directions is an independent platform* for exchanging and discussing ideas – old and new ones – on Europe’s place in the digital world and world views on digital Europe. Through analysis, commentaries and interviews, Directions aims to stimulate a European debate and showcase the diversity of voices about the present […]
Publication
Improving Cybersecurity Awareness in Underserved Populations
Authors
Year
- 2019
Description
- This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highli…
Improving Cybersecurity Awareness in Underserved Populations
This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highlights research indicating that “underserved” residents in San Francisco, California— including low-income residents, seniors, and foreign language speakers—face higher-than-average risks of being victims of cyber attacks. They are less likely to know whether they have even been […]
Publication
The Saudi Cybersecurity Workforce Development (SCyWF)
Authors
Year
- 2020
Description
- The Saudi National Cybersecurity Authority (NCA) is leading the national effort to protect the count…
The Saudi Cybersecurity Workforce Development (SCyWF)
The Saudi National Cybersecurity Authority (NCA) is leading the national effort to protect the country’s cyber space. This mission requires a qualified national cybersecurity workforce capable of carrying out all types of cybersecurity work. The NCA’s mandate was issued by Royal Order number 6801, dated October 31, 2017. It includes […]
Publication
Cyber-risk Oversight Handbook for Corporate Boards
Authors
Year
- 2019
Description
- Cyber-attacks are the fastest growing, and perhaps most dangerous, threat facing organizations today…
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-attacks are the fastest growing, and perhaps most dangerous, threat facing organizations today. Boards of Directors must take a leading role in oversight of the safety of their company’s cyber systems. However, a recent study from the Organization of American States and the InterAmerican Development Bank found corporate boards in Latin […]
Publication
Cybersecurity Education: Planning for the Future Through Workforce Development
Authors
Year
- 2020
Description
- As the number of malicious activities in cyberspace continues to rise, the need for a workforce trai…
Cybersecurity Education: Planning for the Future Through Workforce Development
As the number of malicious activities in cyberspace continues to rise, the need for a workforce trained in cybersecurity is a necessity. The indispensable skills for such a workforce include the ability to optimally design and operate applications and systems with the capacity to identify and respond to cyber threats, […]
Publication
Building cyber security awareness in a developing country: Lessons from Myanmar
Authors
Year
- 2020
Description
- The paper discusses the arguments for inclusion of cybersecurity awareness building in development a…
Building cyber security awareness in a developing country: Lessons from Myanmar
The paper discusses the arguments for inclusion of cybersecurity awareness building in development assistance programs. We note that cybersecurity awareness building can strengthen the resilience of productivity-enhancing services, such as mobile banking and e-payment systems, and benefit economic growth. We develop a typology of cybersecurity strategies involving government, the private […]
Publication
Digital Inclusion and a Trusted Internet: The Role of the International Development Community in Balancing Internet Access and Cybersecurity
Authors
Year
- 2018
Description
- The international development community has embraced the potential of digital technology to expand t…
Digital Inclusion and a Trusted Internet: The Role of the International Development Community in Balancing Internet Access and Cybersecurity
The international development community has embraced the potential of digital technology to expand the reach of life-enhancing services and provide a platform for collaboration and innovation. For at least the past two decades, international development practitioners have turned to digital tools to improve the delivery of traditional development programs in […]
Publication
New Ways to Bring Women Into and Up Through Cybersecurity Careers
Authors
Year
- 2019
Description
- Women make up less than one-quarter of the cybersecurity workforce, which can lead to less innovatio…
New Ways to Bring Women Into and Up Through Cybersecurity Careers
Women make up less than one-quarter of the cybersecurity workforce, which can lead to less innovation, inferior design, seriously underutilized human potential, and needlessly unfilled jobs in a growing field. In short, this lack of gender diversity means poorer security. Existing efforts to address the issue have begun to create […]
Publication
Cybersecurity Workforce Development: A Primer
Authors
Year
- 2018
Description
- This report unpacks the many issues and questions that collectively make up “the cybersecurity wor…
Cybersecurity Workforce Development: A Primer
This report unpacks the many issues and questions that collectively make up “the cybersecurity workforce development challenge” in the United States. Our aim is to inform the discussion, make the case that the challenge warrants policy intervention, and highlight areas ripe for further research and policy intervention. We argue that […]
Publication
Cybersecurity Awareness in the Commonwealth of Nations
Authors
Year
- 2020
Description
- The Cybersecurity Tech Accord and the United Kingdom’s Foreign and Commonwealth Office have collab…
Cybersecurity Awareness in the Commonwealth of Nations
The Cybersecurity Tech Accord and the United Kingdom’s Foreign and Commonwealth Office have collaborated in developing this report as part of an ongoing partnership to better understand and promote cybersecurity awareness across the Commonwealth of Nations (“the Commonwealth ). It provides a brief introduction to both the Cybersecurity Tech Accord […]
Tool
“KIDS 4 CYBER” Workshop Kit
Authors
Year
- 2018
Description
- As part of ICON’s actions, they are providing a ready- to-use kit to create a workshop and explore…
“KIDS 4 CYBER” Workshop Kit
As part of ICON’s actions, they are providing a ready- to-use kit to create a workshop and explore the cyber space with future generations. The goal is to think together about the issues of cyberspace. To discover and open the field of possibilities of new technologies and their applications. This […]