National Computer Security Incident Response

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 16-30 of 72 results

   
   
Publication

Team Types Within the Context of Services Frameworks (1.0 v)

Authors

Year

  • 2024

Description

  • The Forum of Incident Response and Security Teams (FIRST) Services Frameworks have been developed fo…

 

Team Types Within the Context of Services Frameworks (1.0 v)

The Forum of Incident Response and Security Teams (FIRST) Services Frameworks have been developed for two primary team types: Computer Security Incident Response Teams (CSIRTs) and Product Security Incident Response Teams (PSIRTs). While there are established definitions for these teams, variations in practice and context may give slightly different meanings […]

Publication

Developing a cybersecurity crisis management plan

Authors

Year

  • 2023

Description

  • In October 2022, DCAF – the Geneva Centre for Security Sector Governance, brought together legal e…

 

Developing a cybersecurity crisis management plan

In October 2022, DCAF – the Geneva Centre for Security Sector Governance, brought together legal experts from the Western Balkans for a Seminar on National Cybersecurity Legislation in Veles, North Macedonia. The seminar was organised in close cooperation with the Ministry of Information Society and Administration of the Republic of […]

Publication

Joint Publication – Boosting your Organisation’s Cyber Resilience

Authors

Year

  • 2022

Description

  • About In light of rising major cyber threats, the European Union Agency for Cybersecurity (ENISA) an…

 

Joint Publication – Boosting your Organisation’s Cyber Resilience

About In light of rising major cyber threats, the European Union Agency for Cybersecurity (ENISA) and CERT- EU published a joint set of cybersecurity best practices for public and private organisations in the EU. The publication is mainly intended for decision makers (both in IT and general management) and security […]

Publication

CERT-EU Security Guidance 22-001: Cybersecurity mitigation measures against critical threats

Authors

Year

  • 2023

Description

  • About On February 14, ENISA and CERT-EU made a joint publication strongly encouraging all EU based o…

 

CERT-EU Security Guidance 22-001: Cybersecurity mitigation measures against critical threats

About On February 14, ENISA and CERT-EU made a joint publication strongly encouraging all EU based organisations to implement a set of cybersecurity best practices. Building on this joint publication, CERT-EU made available specific implementation recommendations. By applying these systematically, organisations can boost their cybersecurity defence and resilience. This would […]

Publication

Cyber Insurance and Systemic Market Risk

Authors

Year

  • 2020

Description

  • This report proposes a method to better protect against losses associated with attacks by malicious …

 

Cyber Insurance and Systemic Market Risk

This report proposes a method to better protect against losses associated with attacks by malicious actors. The EastWest Institute puts forward a mechanism by which insurance industry can quantify and account for cyber risks. Recommendations to increase the cyber resilience and cybersecurity of economies are presented thereafter.  

Tool

European Repository of Cyber Incidents (EuRepoC)

Authors

Year

  • 2022

Description

  • The European Repository of Cyber Incidents (EuRepoC) is an independent research consortium dedicat…

 

European Repository of Cyber Incidents (EuRepoC)

The European Repository of Cyber Incidents (EuRepoC) is an independent research consortium dedicated to better understanding the cyber threat environment, particularly in the European Union. As a public information forum, its goal is to be a resource for its member institutions, government officials, civil society, business executives, journalists, educators, students, and other […]

Publication

Practical Guide for CSIRTs (Volume 2): A Sustainable Business Model

Authors

Year

  • 2023

Description

  • This guide is based on the previous document “Best Practices for Establishing a National CSIRT…

 

Practical Guide for CSIRTs (Volume 2): A Sustainable Business Model

This guide is based on the previous document “Best Practices for Establishing a National CSIRT“, developed by the Organization of American States (OAS) in 2016, which covers topics on planning and implementing a Computer Security Incident Response Team (CSIRT). This second edition is intended to build upon the previous and […]

Tool

Cyber Incident Reporting Framework: Global Edition

Authors

Year

  • 2023

Description

  • The updated, global edition of the framework presented here builds off that first document that CTA …

 

Cyber Incident Reporting Framework: Global Edition

The updated, global edition of the framework presented here builds off that first document that CTA and IST released in November 2022, and adds significant contextual discussion. It develops a model reporting format that cybersecurity authorities and other government authorities worldwide could use as the foundation for their national reporting […]

Publication

Cyber Incident Classification: A Report on Emerging Practices within the OSCE region

Authors

Year

  • 2022

Description

  • The report highlights emerging practices in national classification of cyber incidents by underlinin…

 

Cyber Incident Classification: A Report on Emerging Practices within the OSCE region

The report highlights emerging practices in national classification of cyber incidents by underlining commonalities in existing approaches to cyber incident classification among OSCE participating States and identifying limitations in this process. Although experiences in developing cyber incident classification systems are diverse across participating States, the knowledge derived from these processes […]

Tool

Blueprint for Ransomware Defense

Authors

Year

  • 2022

Description

  • The Blueprint for Ransomware is a clear, actionable framework for ransomware mitigation, response, a…

 

Blueprint for Ransomware Defense

The Blueprint for Ransomware is a clear, actionable framework for ransomware mitigation, response, and recovery for small and medium enterprises that are most relevant to combating ransomware.  The Blueprint recommendations are a curated subset of essential cyber hygiene Safeguards from the Center for Internet Security Critical Security Controls® (CIS Controls®) […]

Publication

Ransomware Task Force Report: Combating Ransomware

Authors

Year

  • 2021

Description

  • The RTF Report is a strategic framework that aims to help policymakers and industry leaders take sys…

 

Ransomware Task Force Report: Combating Ransomware

The RTF Report is a strategic framework that aims to help policymakers and industry leaders take system-level action — through potential legislation, funding new programs, or launching new industry-level collaborations — that will help the international community build resistance, disrupt the ransomware business model, and develop resilience to the ransomware […]

Tool

Cyber Incident Management (CIM) Cybil Portal Resources Guide

Authors

Year

  • 2022

Description

  • The Cyber Incident Management (CIM) Cybil Portal Resources Guide is an initiative of the GFCE Workin…

 

Cyber Incident Management (CIM) Cybil Portal Resources Guide

The Cyber Incident Management (CIM) Cybil Portal Resources Guide is an initiative of the GFCE Working Group B CIM Task Force. The objective of this guide is to provide an overview of all the resources that are available for the CIM community on the Cybil Portal as of October 2022. […]

Publication

Establishing a CSIRT

Authors

Year

  • 2017

Description

  • This handbook is designed for organizations who wish to learn more about CSIRT teams and start one t…

 

Establishing a CSIRT

This handbook is designed for organizations who wish to learn more about CSIRT teams and start one themselves. It describes both the process to establish a team and the various requirements. Examples are given where possible, to show how each step can be completed. The intended audience is management level, […]

Tool

CSIRT Maturity Kit

Authors

Year

  • 2015

Description

  • The purpose of this CSIRT Maturity Kit is to help emerging and existing Computer Security Response T…

 

CSIRT Maturity Kit

The purpose of this CSIRT Maturity Kit is to help emerging and existing Computer Security Response Teams (CSIRTs) to increase their maturity level. This is achieved by offering a set of best practices that cover CSIRT governance, organisation and operations. The document that is presented now provides a starting point […]

Tool

SOC-CMM & SOC-CMM for CERT

Authors

Year

  • 2022

Description

  • The SOC-CMM is a capability maturity model that can be used to perform a self-assessment of your Sec…

 

SOC-CMM & SOC-CMM for CERT

The SOC-CMM is a capability maturity model that can be used to perform a self-assessment of your Security Operations Center (SOC). The model is based on review conducted on literature regarding SOC setup and existing SOC models as well as literature on specific elements within a SOC. The literature analysis […]

42

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.