Tool
SIM3 Self Assessment Tool
Authors
Year
- 2022
Description
- The Open CSIRT Foundation developed an online self-assessment tool for SIM3. This tool is meant for …
SIM3 Self Assessment Tool
The Open CSIRT Foundation developed an online self-assessment tool for SIM3. This tool is meant for all types of CSIRTs. The tool assesses different aspects about the organisation, human (personnel), tools and processes aspects of a CSIRT.
Tool
ENISA CSIRT Maturity Framework
Authors
Year
- 2022
Description
- The ENISA CSIRT Maturity Framework is intended to contribute to the enhancement of the global capaci…
ENISA CSIRT Maturity Framework
The ENISA CSIRT Maturity Framework is intended to contribute to the enhancement of the global capacity to manage cyber incidents, with a focus on CSIRTs. Cyber incidents and developments are inherently transnational and effective responses depend on transnational collaboration. The establishment of national CSIRTs1 is an essential step to facilitate […]
Tool
ENISA – CSIRT Online Training Materials
Authors
Year
- 2019
Description
- ENISA Cyber Security Training material was introduced in 2008. Since then it has been complemented w…
ENISA – CSIRT Online Training Materials
ENISA Cyber Security Training material was introduced in 2008. Since then it has been complemented with new additions containing essential material for success in the CSIRT community and in the field of Cyber Security. Through it, you will find training material, containing Handbooks for teachers, Toolsets for students and Virtual […]
Tool
FIRST CSIRT Services Framework (Version 2.1)
Authors
Year
- 2019
Description
- The Computer Security Incident Response Team (CSIRT) Services Framework is a high-level document des…
FIRST CSIRT Services Framework (Version 2.1)
The Computer Security Incident Response Team (CSIRT) Services Framework is a high-level document describing in a structured way a collection of cyber security services and associated functions that Computer Security Incident Response Teams and other teams providing incident management related services may provide. The mission and purpose of the CSIRT […]
Publication
11 Strategies of A World-Class Cybersecurity Operations Center
Authors
Year
- 2022
Description
- This book presents an overview of how to organize and consider the many functions in cybersecurity o…
11 Strategies of A World-Class Cybersecurity Operations Center
This book presents an overview of how to organize and consider the many functions in cybersecurity operations centers (SOCs). It describes strategies that can be applied to SOCs of all sizes, from two people to large, multi-national centers with hundreds of people. It is intended for all cybersecurity operations center […]
Publication
SEI – Create a CSIRT
Authors
Year
- 2017
Description
- Keeping organizational information assets secure in today’s interconnected computing environme…
SEI – Create a CSIRT
Keeping organizational information assets secure in today’s interconnected computing environment is a true challenge that becomes more difficult with each new “e” product and each new intruder tool. Most organizations realize that there is no one solution or panacea for securing systems and data; instead a multi-layered security strategy is […]
Publication
Building a SOC: Start Small
Authors
Year
- 2017
Description
- Protecting and defending against digital attacks requires visibility and control of the digital infr…
Building a SOC: Start Small
Protecting and defending against digital attacks requires visibility and control of the digital infrastructure within your organisation and of all the events taking place within this. An increasingly common way to achieve this is to implement a Security Operations Centre (SOC). However, in order for a SOC to function successfully, […]
Publication
ITU cybersecurity programme: CIRT framework
Authors
Year
- 2021
Description
- This report sets out how to establish a national CIRT and outlines cooperation mechanisms at the reg…
ITU cybersecurity programme: CIRT framework
This report sets out how to establish a national CIRT and outlines cooperation mechanisms at the regional and international levels that identify, manage, and respond to cyberthreats.
Publication
The Sector CSIRT Framework: Developing Sector-Based Incident Response Capabilities
Authors
Year
- 2021
Description
- The U.S. Department of State, Office of the Coordinator for Cyber Issues commissioned the Software E…
The Sector CSIRT Framework: Developing Sector-Based Incident Response Capabilities
The U.S. Department of State, Office of the Coordinator for Cyber Issues commissioned the Software Engineering Institute (SEI) to create the Sector CSIRT Framework for (1) developing a sector-based computer security incident response and coordination capability and (2) integrating this capability into a larger national cybersecurity ecosystem as applicable. The […]
Publication
Global Cyber Expertise Magazine – Issue 11 – September 2022
Authors
Year
- 2022
Description
- The Global Cyber Expertise Magazine is a joint initiative by the African Union, European Union, Glob…
Global Cyber Expertise Magazine – Issue 11 – September 2022
The Global Cyber Expertise Magazine is a joint initiative by the African Union, European Union, Global Forum on Cyber Expertise and Organization of American States. The Magazine aims to provide cyber policymakers and stakeholders insight on cyber capacity building projects, policies and developments globally. In this edition, our cover story […]
Publication
Cyber Incident Management in Low-Income Countries
Authors
Year
- 2022
Description
- This report discusses the findings and recommendations of the “Cyber Incident Management in Low-In…
Cyber Incident Management in Low-Income Countries
This report discusses the findings and recommendations of the “Cyber Incident Management in Low-Income Countries” project, funded by Global Affairs Canada. The project aims to create a tailorable guide for low-income countries to develop or improve their CSIRT capabilities in an affordable way to respond to the evolving cyber threat […]
Publication
Global Cyber Expertise Magazine – Issue 10 – November 2021
Authors
Year
- 2021
Description
- The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …
Global Cyber Expertise Magazine – Issue 10 – November 2021
The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. In this edition, our cover story takes a […]
Tool
How to set up CSIRT and SOC: Good practice Guide
Authors
Year
- 2020
Description
- Cybersecurity threats are increasing and becoming more complex. One of the most effective ways to co…
How to set up CSIRT and SOC: Good practice Guide
Cybersecurity threats are increasing and becoming more complex. One of the most effective ways to counter these threats is by creating a global ecosystem of computer security incident response teams (CSIRTs) and security operations centres (SOCs) that can communicate, share information and respond to cyberthreats effectively. This can be facilitated […]
Tool
Getting started with a National CSIRT guide
Authors
Year
- 2021
Description
- Why does your country need a national CSIRT? What does it take to build one? And where do you begin?…
Getting started with a National CSIRT guide
Why does your country need a national CSIRT? What does it take to build one? And where do you begin? If you are asking yourself these types of questions, we have got some good news for you. This guide is structured in such a way that you can easily navigate […]
Tool
Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity
Authors
Year
- 2020
Description
- This joint advisory is the result of a collaborative research effort by the cybersecurity authoritie…
Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity
This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia Canada New Zealand The United Kingdom The United States It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of this report is […]