Publication
Global Cyber Expertise Magazine – Issue 10 – November 2021
Authors
Year
- 2021
Description
- The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …
Global Cyber Expertise Magazine – Issue 10 – November 2021
The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. In this edition, our cover story takes a […]
Tool
CyberSeek
Authors
Year
- 2016
Description
- To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about suppl…
CyberSeek
To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market. Cybersecurity workers protect our most important and private information, from bank accounts to sensitive military communications. However, there is a dangerous shortage of cybersecurity workers in the United States […]
Publication
The Saudi Cybersecurity Workforce Development (SCyWF)
Authors
Year
- 2020
Description
- The Saudi National Cybersecurity Authority (NCA) is leading the national effort to protect the count…
The Saudi Cybersecurity Workforce Development (SCyWF)
The Saudi National Cybersecurity Authority (NCA) is leading the national effort to protect the country’s cyber space. This mission requires a qualified national cybersecurity workforce capable of carrying out all types of cybersecurity work. The NCA’s mandate was issued by Royal Order number 6801, dated October 31, 2017. It includes […]
Publication
Cybersecurity Education: Planning for the Future Through Workforce Development
Authors
Year
- 2020
Description
- As the number of malicious activities in cyberspace continues to rise, the need for a workforce trai…
Cybersecurity Education: Planning for the Future Through Workforce Development
As the number of malicious activities in cyberspace continues to rise, the need for a workforce trained in cybersecurity is a necessity. The indispensable skills for such a workforce include the ability to optimally design and operate applications and systems with the capacity to identify and respond to cyber threats, […]
Publication
Digital Inclusion and a Trusted Internet: The Role of the International Development Community in Balancing Internet Access and Cybersecurity
Authors
Year
- 2018
Description
- The international development community has embraced the potential of digital technology to expand t…
Digital Inclusion and a Trusted Internet: The Role of the International Development Community in Balancing Internet Access and Cybersecurity
The international development community has embraced the potential of digital technology to expand the reach of life-enhancing services and provide a platform for collaboration and innovation. For at least the past two decades, international development practitioners have turned to digital tools to improve the delivery of traditional development programs in […]
Publication
New Ways to Bring Women Into and Up Through Cybersecurity Careers
Authors
Year
- 2019
Description
- Women make up less than one-quarter of the cybersecurity workforce, which can lead to less innovatio…
New Ways to Bring Women Into and Up Through Cybersecurity Careers
Women make up less than one-quarter of the cybersecurity workforce, which can lead to less innovation, inferior design, seriously underutilized human potential, and needlessly unfilled jobs in a growing field. In short, this lack of gender diversity means poorer security. Existing efforts to address the issue have begun to create […]
Publication
Cybersecurity Workforce Development: A Primer
Authors
Year
- 2018
Description
- This report unpacks the many issues and questions that collectively make up “the cybersecurity wor…
Cybersecurity Workforce Development: A Primer
This report unpacks the many issues and questions that collectively make up “the cybersecurity workforce development challenge” in the United States. Our aim is to inform the discussion, make the case that the challenge warrants policy intervention, and highlight areas ripe for further research and policy intervention. We argue that […]
Tool
“KIDS 4 CYBER” Workshop Kit
Authors
Year
- 2018
Description
- As part of ICON’s actions, they are providing a ready- to-use kit to create a workshop and explore…
“KIDS 4 CYBER” Workshop Kit
As part of ICON’s actions, they are providing a ready- to-use kit to create a workshop and explore the cyber space with future generations. The goal is to think together about the issues of cyberspace. To discover and open the field of possibilities of new technologies and their applications. This […]
Tool
Palo Alto Networks Cybersecurity Academy
Authors
Year
- 2016
Description
- Palo Alto Networks Cybersecurity Academy exists to equip students with the next-generation cybersecu…
Palo Alto Networks Cybersecurity Academy
Palo Alto Networks Cybersecurity Academy exists to equip students with the next-generation cybersecurity knowledge and skills they’ll need to succeed in today’s rapidly changing cyberthreat landscape. It provides technology and resources for use in the classroom—at no cost— to any degree-granting, nationally accredited secondary or postsecondary academic institutions. In the […]
Tool
ITU 2020 Guidelines on Child Online Protection (COP)
Authors
Year
- 2020
Description
- The ITU Guidelines on Child Online Protection are a comprehensive set of recommendations for all r…
ITU 2020 Guidelines on Child Online Protection (COP)
The ITU Guidelines on Child Online Protection are a comprehensive set of recommendations for all relevant stakeholders on how to contribute to the development of a safe and empowering online environment for children and young people.
Publication
Cybersecurity Skills Development in the EU
Authors
Year
- 2020
Description
- This report focuses on the status of the cybersecurity education system and the inability to attract…
Cybersecurity Skills Development in the EU
This report focuses on the status of the cybersecurity education system and the inability to attract more students in studying cybersecurity and to produce graduates with “the right cybersecurity knowledge and skills”. It argues that many of the current issues in cybersecurity education could be lessened by redesigning educational and […]
Tool
Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce
Authors
Year
- 2014
Description
- The strategic management of the workforce in any enterprise must be based upon a clear understanding…
Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce
The strategic management of the workforce in any enterprise must be based upon a clear understanding of, and linkage to, enterprise strategy. In the case of securing data, systems and infrastructure, this means that workforce planning must align with a comprehensive cybersecurity strategy. While this field has often been considered […]
Publication
Global Cyber Expertise Magazine – Issue 7 – April 2020
Authors
Year
- 2020
Description
- The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …
Global Cyber Expertise Magazine – Issue 7 – April 2020
The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. As we celebrate our 5th Anniversary in April […]
Tool
Cyber Strategy Development & Implementation (CSDI) Framework
Authors
Year
- 2020
Description
- MITRE’s Cyber Strategy Development and Implementation (CSDI) Framework draws from the best pra…
Cyber Strategy Development & Implementation (CSDI) Framework
MITRE’s Cyber Strategy Development and Implementation (CSDI) Framework draws from the best practices of more than 18 US, International, and Industry models. It uses a combination of design thinking activities, threat/opportunity/resources contextualization, and a lens of eight key cyber capacity areas in a four-phase strategy approach to assessing cyber needs […]






