Cyber Security Policy and Strategy

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 181-195 of 200 results

   
   
Tool

Multistakeholder Approaches to National Cybersecurity Development

Authors

Year

  • 2018

Description

  • For some time, governments and non-governmental actors alike have been calling for greater stakehold…

 

Multistakeholder Approaches to National Cybersecurity Development

For some time, governments and non-governmental actors alike have been calling for greater stakeholder involvement in cybersecurity policy. Despite this, multistakeholder approaches to national cybersecurity strategy (NCSS) development remain comparatively rare. In part, this is as a result of a critical gap in the cyber capacity building landscape, which currently […]

Tool

National Cyber Security Strategies: Practical Guide on Development and Execution

Authors

Year

  • 2012

Description

  • his report introduces a set of concrete actions, which if implemented will lead to a coherent and ho…

 

National Cyber Security Strategies: Practical Guide on Development and Execution

his report introduces a set of concrete actions, which if implemented will lead to a coherent and holistic national cyber-security strategy. It also proposes a national cyber-security strategy lifecycle, with a special emphasis on the development and execution phase. For each component of the strategy a list of possible and […]

Tool

Recommendations of the Council on Digital Government Strategies

Authors

Year

  • 2014

Description

  • This Recommendation aims to support the development and implementation of digital government strateg…

 

Recommendations of the Council on Digital Government Strategies

This Recommendation aims to support the development and implementation of digital government strategies that bring governments closer to citizens and businesses. It recognises that today’s technology is not only a strategic driver for improving public sector efficiency, but can also support effectiveness of policies and create more open, transparent, innovative, […]

Tool

Recommendation on Digital Security Risk Management for Economic and Social Prosperity

Authors

Year

  • 2015

Description

  • This OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity and …

 

Recommendation on Digital Security Risk Management for Economic and Social Prosperity

This OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity and its Companion Document provide guidance for a new generation of national strategies on the management of digital security risk aimed to optimise the economic and social benefits expected from digital openness.

Tool

Commonwealth Approach for Developing National Cyber Security Strategies

Authors

Year

  • 2015

Description

  • The world is witnessing the emergence of contrasting views and approaches  on how to govern the Cyb…

 

Commonwealth Approach for Developing National Cyber Security Strategies

The world is witnessing the emergence of contrasting views and approaches  on how to govern the Cyberspace. Mindful of the unique nature of Cyberspace and of the importance of maintaining it  as a place that fosters interactions, innovation and entrepreneurship, the CTO embarked on a project to develop the Commonwealth […]

Tool

Developing a National Strategy for Cybersecurity

Authors

Year

  • 2013

Description

  • Microsoft strongly supports governments taking steps to protect their most essential information  a…

 

Developing a National Strategy for Cybersecurity

Microsoft strongly supports governments taking steps to protect their most essential information  and ICT systems—those needed to support national security, the economy, and public safety. A national cybersecurity strategy is critical for managing national-level cyber risks and developing appropriate legislation or regulation to support those efforts. As a global software […]

Tool

National Cyber Security Strategy Guidelines

Authors

Year

  • 2013

Description

  • The aim of the National Cyber Security Strategy Guidelines is to assist national policy planners in …

 

National Cyber Security Strategy Guidelines

The aim of the National Cyber Security Strategy Guidelines is to assist national policy planners in drafting, improving, implementing and evaluating their national cyber security strategies (NCSS) and other related documents, thereby achieving a higher level of protection against rapidly evolving cyber threats. The Guidelines take a comprehensive approach to […]

Tool

Good Practice Guide on National Cyber Security Strategies

Authors

Year

  • 2016

Description

  • To meet current and emerging cyber security threats, EU Member States need to constantly develop and…

 

Good Practice Guide on National Cyber Security Strategies

To meet current and emerging cyber security threats, EU Member States need to constantly develop and adapt their  cyber security strategies. National cyber security strategies (NCSS) are the main documents of nation states to set strategic principles, guidelines, and objectives and in some cases specific measures in order to mitigate […]

Tool

Cybersecurity Strategies Evaluation Tool

Authors

Year

  • 2018

Description

  • ENISA created this tool to help Member States evaluate their strategic priorities and objectives rel…

 

Cybersecurity Strategies Evaluation Tool

ENISA created this tool to help Member States evaluate their strategic priorities and objectives related to National Cyber Security Strategies. Select your country’s cyber security priorities and answer a few simple questions (with a YES or a NO) to reveive ideas and advice for improvement. Source – ENISA website

Tool

Guide to Developing a National Cybersecurity Strategy (1st Edition 2018)

Authors

Year

  • 2018

Description

  • The purpose of this document is to guide national leaders and policy-makers in the development of a …

 

Guide to Developing a National Cybersecurity Strategy (1st Edition 2018)

The purpose of this document is to guide national leaders and policy-makers in the development of a National Cybersecurity Strategy, and in thinking strategically about cybersecurity, cyber-preparedness and resilience. This Guide aims to provide a useful, flexible and user-friendly framework to set the context of a country’s socio-economic vision and […]

Tool

Portal of Cybersecurity Capacity Maturity Model (CMM) Review Reports

Authors

Year

  • 2024

Description

  • The CMM has been deployed more than 120 times in over 85 nations around the world, including two reg…

 

Portal of Cybersecurity Capacity Maturity Model (CMM) Review Reports

The CMM has been deployed more than 120 times in over 85 nations around the world, including two regional studies in Latin America and the Caribbean through collaboration with the OAS. Each of the reviews has been coordinated and facilitated either by the GCSCC and one or more of its […]

Tool

Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition

Authors

Year

  • 2021

Description

  • The Cybersecurity Capacity Maturity Model for Nations (CMM) facilitates the assessment of a countryâ…

 

Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition

The Cybersecurity Capacity Maturity Model for Nations (CMM) facilitates the assessment of a country’s cybersecurity capacity maturity. Developed by the Global Cyber Security Capacity Centre (GCSCC) of University of Oxford in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil […]

Tool

International Cyber Law in Practice: Interactive Toolkit

Authors

Year

  • 2024

Description

  • The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work w…

 

International Cyber Law in Practice: Interactive Toolkit

The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations. The Toolkit may be explored and utilized in a number of different ways. At its core, it presently consists of 32 hypothetical scenarios. Each […]

Tool

Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS

Authors

Year

  • 2016

Description

  • Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’…

 

Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS

Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’t do bad things, right? Norms can help us move in that direction. Internationally, norms are one of three tools available to limit destructive behavior by bad actors.The other two are coercion and treatiesor […]

Tool

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Authors

Year

  • 2016

Description

  • Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from …

 

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from the use of information and communication technologies will be consistent with: international law, including, inter alia, the UN Charter and the International Covenant on Civil and Political Rights; the Helsinki Final Act; and their responsibilities […]

5

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.