Publication
The Ransomware Playbook and How to Disrupt It
Authors
Year
- 2025
Description
- Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …
Publication
How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)
Authors
Year
- 2017
Description
- The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …
Publication
Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)
Authors
Year
- 2024
Description
- This cyber security guide aims to provide medium-sized companies with the necessary tools and strate…
Tool
CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs
Authors
Year
- 2025
Description
- This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…
Tool
Geneva Dialogue – Cyber Quest
Authors
Year
- 2025
Description
- This online role-play simulation is designed for diplomats and professionals directly engaged in sha…
Publication
Private-public initiatives for cybersecurity: the case of Ukraine
Authors
Year
- 2024
Description
- Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian c…
Tool
CSIRT Maturity – Self-assessment Tool
Authors
Year
- 2022
Description
- This tool helps CSIRTs to self-assess their team’s maturity in terms of 45 parameters of the SIM3 …
Publication
Final Report: Women’s Participation in Southeast Asia’s Cybersecurity Sector
Authors
Year
- 2024
Description
- This report compiles research findings from the “Women’s Participation in Southeast Asia…
Tool
ITU Global Cybersecurity Index (GCI) v5
Authors
Year
- 2024
Description
- The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…
Publication
Digital First Responders – The Role of Computer Security Incident Response Teams (CSIRTS) in Developing Countries
Authors
Year
- 2024
Description
- This note intends to provide policy makers in developing countries with a clear understanding of the…
Publication
Guide on Cyber Threat Intelligence
Authors
Year
- 2024
Description
- A newly published Guide from CREST looks into the different types of Cyber Threat Intelligence — C…
Publication
Best Practices for Cyber Crisis Management
Authors
Year
- 2024
Description
- This study highlights the complexities behind the notion of cyber crisis and the degree of subjectiv…
Publication
Journal of Cyber Policy
Authors
Year
- 2016
Description
- The Journal of Cyber Policy has a strong emphasis on topics that are international in scope, and can…
Publication
Western Balkan CERT Cooperation
Year
- 2021
Description
- This publication focuses on providing concrete proposals for enhancing cooperation among national Co…