National Computer Security Incident Response

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 72 results

   
   
Publication

The Ransomware Playbook and How to Disrupt It

Authors

Year

  • 2025

Description

  • Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …

 

The Ransomware Playbook and How to Disrupt It

Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]

Publication

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

Authors

Year

  • 2017

Description

  • The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …

 

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]

Publication

Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)

Authors

Year

  • 2024

Description

  • This cyber security guide aims to provide medium-sized companies with the necessary tools and strate…

 

Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)

This cyber security guide aims to provide medium-sized companies with the necessary tools and strategies to ensure the security and stability of their operations in the event of a cyber security crisis.

Tool

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

Authors

Year

  • 2025

Description

  • This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…

 

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”, a maturity baseline developed from the SIM3 model2 created by the Open CSIRT Foundation (OCF), an internationally recognized model for assessing the maturity of security teams. CSIRTAmericas Baseline serves to help organizations assess the readiness of their cyber incident […]

Tool

Geneva Dialogue – Cyber Quest

Authors

Year

  • 2025

Description

  • This online role-play simulation is designed for diplomats and professionals directly engaged in sha…

 

Geneva Dialogue – Cyber Quest

This online role-play simulation is designed for diplomats and professionals directly engaged in shaping global cybersecurity policy through the UN Open-ended Working Group (OEWG), and other related processes. The goal of this game is to connect cyber-norms and confidence-building measures (CBMs) to the practice through a practical a case of […]

Publication

Private-public initiatives for cybersecurity: the case of Ukraine

Authors

Year

  • 2024

Description

  • Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian c…

 

Private-public initiatives for cybersecurity: the case of Ukraine

Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian cyber aggression since the invasion of February 2022. During the period, Ukraine has been provided with significant levels of cyber defence support by allied governments and private sector companies. Through expert interviews and roundtables, the […]

Tool

CSIRT Maturity – Self-assessment Tool

Authors

Year

  • 2022

Description

  • This tool helps CSIRTs to self-assess their team’s maturity in terms of 45 parameters of the SIM3 …

 

CSIRT Maturity – Self-assessment Tool

This tool helps CSIRTs to self-assess their team’s maturity in terms of 45 parameters of the SIM3 v2i model. For several parameters, ENISA CSIRT maturity framework requires higher assessment level then it is required under the ENISA CSIRT maturity framework based on SIM3 v1. This is due to a constant […]

Publication

Final Report: Women’s Participation in Southeast Asia’s Cybersecurity Sector

Authors

Year

  • 2024

Description

  • This report compiles research findings from the “Women’s Participation in Southeast Asia…

 

Final Report: Women’s Participation in Southeast Asia’s Cybersecurity Sector

This report compiles research findings from the “Women’s Participation in Southeast Asia’s Cybersecurity Sector” project, which aimed to understand the cybersecurity workforce in Cambodia, Indonesia, Laos, Mongolia, and Thailand, identify workforce gaps, and assess women’s participation across these countries. Conducted in support of the ITU’s Women in Cyber (WiC) Mentorship […]

Tool

ITU Global Cybersecurity Index (GCI) v5

Authors

Year

  • 2024

Description

  • The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…

 

ITU Global Cybersecurity Index (GCI) v5

The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]

Publication

Digital First Responders – The Role of Computer Security Incident Response Teams (CSIRTS) in Developing Countries

Authors

Year

  • 2024

Description

  • This note intends to provide policy makers in developing countries with a clear understanding of the…

 

Digital First Responders – The Role of Computer Security Incident Response Teams (CSIRTS) in Developing Countries

This note intends to provide policy makers in developing countries with a clear understanding of the role and importance of Computer Security Incident Response Teams (CSIRTs) for enhancing cyber resilience. It is based on the data available at the time of writing, and reflects evolving international good practices, including experiences […]

Publication

Guide on Cyber Threat Intelligence

Authors

Year

  • 2024

Description

  • A newly published Guide from CREST looks into the different types of Cyber Threat Intelligence — C…

 

Guide on Cyber Threat Intelligence

A newly published Guide from CREST looks into the different types of Cyber Threat Intelligence — CTI – standalone deliverables and continued threat monitoring services – and crucially, how this discipline can be used to predict, prevent, detect and respond to threats. The updated Guide also includes new sections on […]

Publication

Best Practices for Cyber Crisis Management

Authors

Year

  • 2024

Description

  • This study highlights the complexities behind the notion of cyber crisis and the degree of subjectiv…

 

Best Practices for Cyber Crisis Management

This study highlights the complexities behind the notion of cyber crisis and the degree of subjectivity it involves. The elevation of a large-scale cyber incident into a cyber crisis relies predominantly on a political decision, and depends largely on the level of risk that EU Member States (MS) are prepared […]

Publication

Journal of Cyber Policy

Authors

Year

  • 2016

Description

  • The Journal of Cyber Policy has a strong emphasis on topics that are international in scope, and can…

 

Journal of Cyber Policy

The Journal of Cyber Policy has a strong emphasis on topics that are international in scope, and can address national and international cyber policy challenges. The challenges of the cyber world are cross-disciplinary, and the journal reflects this in the range of contributions that it solicits. The list of disciplines […]

Publication

Western Balkan CERT Cooperation

Year

  • 2021

Description

  • This publication focuses on providing concrete proposals for enhancing cooperation among national Co…

 

Western Balkan CERT Cooperation

This publication focuses on providing concrete proposals for enhancing cooperation among national Computer Security Incident Response Teams (CSIRTs) in the Western Balkans. It addresses questions related to areas of cooperation, successful CSIRT networks, and strategies for improving multilateral cooperation, while considering individual capacities and capabilities of the participating CSIRTs. Additional […]

Publication

Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders

Authors

Year

  • 2024

Description

  • This Guidebook is intended to help, in particular, new employees of Computer Security Incident Respo…

 

Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders

This Guidebook is intended to help, in particular, new employees of Computer Security Incident Response Teams (CSIRTs) (though it is likely relevant for existing CSIRT employees) understand the structure of CSIRTs, and clarify the expectations and how they can best be achieved.

57

more brilliant tools and publications this way

1 2 3 5

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.