Warning: Undefined array key "_sft_themes" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 87

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214

Warning: Attempt to read property "parent" on false in /home2/cyb1lp0/public_html/wp-content/themes/cyber/archive-categories.php on line 214


Warning: Undefined array key "_sft_themes" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_themes" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_themes" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_themes" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889

Warning: Undefined array key "_sft_themes" in /home2/cyb1lp0/public_html/wp-content/themes/cyber/inc/template-tags.php on line 889
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 196-210 of 538 results

   
   
Tool

Introduction to Tabletop Exercises: a Practical Guidebook for Organizations

Authors

Year

  • 2023

Description

  • This publication seeks to provide guidance in designing, developing and evaluating how and when to c…

 

Introduction to Tabletop Exercises: a Practical Guidebook for Organizations

This publication seeks to provide guidance in designing, developing and evaluating how and when to conduct a tabletop exercise as a tool to improve an organization’s cyber security policymaking and operations capacities. The guide aims to offer a public-private cross organizational scope. Therefore, it is not written from a strictly […]

Publication

Cyber Incident Classification: A Report on Emerging Practices within the OSCE region

Authors

Year

  • 2022

Description

  • The report highlights emerging practices in national classification of cyber incidents by underlinin…

 

Cyber Incident Classification: A Report on Emerging Practices within the OSCE region

The report highlights emerging practices in national classification of cyber incidents by underlining commonalities in existing approaches to cyber incident classification among OSCE participating States and identifying limitations in this process. Although experiences in developing cyber incident classification systems are diverse across participating States, the knowledge derived from these processes […]

Tool

.auCHECK

Authors

Year

  • 2022

Description

  • .auCheck is an initiative of the Australian Strategic Policy Institute (ASPI) in cooperation with au…

 

.auCHECK

.auCheck is an initiative of the Australian Strategic Policy Institute (ASPI) in cooperation with auDA. .auCheck provides a series of tests that check whether internet services follow standards advised by the Australian government and are up to date. .auCheck is a non-commercial, independent and free service. Our mission is to […]

Tool

Mutually Agreed Norms for Routing Security (MANRS)

Authors

Year

  • 2014

Description

  • Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Interne…

 

Mutually Agreed Norms for Routing Security (MANRS)

Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. MANRS offers specific actions via four programs for Network Operators, Internet Exchange Points, CDN and Cloud Providers, and Equipment Vendors.

Tool

NetBeacon

Authors

Year

  • 2022

Description

  • NetBeacon is a tool created by the DNS Abuse Institute to empower individuals and organizations to r…

 

NetBeacon

NetBeacon is a tool created by the DNS Abuse Institute to empower individuals and organizations to report suspected online abuse and to empower registrars to take action against online abuse. NETBEACON’S MISSION IS TWOFOLD: Make it easy for people to report online abuse. Make it easy for industry to act […]

Tool

Knowledge-sharing and Instantiating Norms for DNS and Naming Security (KINDNS)

Authors

Year

  • 2022

Description

  • KINDNS is an ICANN initiative to promote voluntary security best practices for authoritative and rec…

 

Knowledge-sharing and Instantiating Norms for DNS and Naming Security (KINDNS)

KINDNS is an ICANN initiative to promote voluntary security best practices for authoritative and recursive DNS operators.  It relies on a self-assessment tool that walks users through a series of questions to help them understand where they are positioned in the scale of the practices that the framework promotes. To develop a […]

Publication

Compendio de Ciberdelincuencia Organizada

Authors

Year

  • 2022

Description

  • El presente compendio tiene como objectivo mostrar la forma en que sistemas de justicia de penal de …

 

Compendio de Ciberdelincuencia Organizada

El presente compendio tiene como objectivo mostrar la forma en que sistemas de justicia de penal de todo el mundo han respondido a la ciberdelincuencia organizada. Tiene un alcance mundial e intenta, en la medida de lo posible, que haya una representación equitativa de casos de diferentes regiones geográficas y […]

Publication

Ukraine Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity: the legislative framework, and key national a…

 

Ukraine Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity: the legislative framework, and key national actors in cybersecurity. It describes the main cybersecurity threats in Ukraine and the needs arising from its national security objectives. The present assessment paper describes the normative and legislative framework of the Ukraine, which covers the […]

Publication

Georgia Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity: the legislative framework and key national ac…

 

Georgia Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity: the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in Georgia and the needs arising from national security objectives. It describes the normative and legislative framework of Georgia covering the main […]

Publication

Azerbaijan Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…

 

Azerbaijan Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity, including the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in Azerbaijan and the needs arising from national security objectives. It describes the normative and legislative framework of Azerbaijan which covers […]

Publication

Armenia Cybersecurity Governance Assessment

Authors

Year

  • 2021

Description

  • This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…

 

Armenia Cybersecurity Governance Assessment

This report is a two-factor analysis of cybersecurity, including the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in the Republic of Armenia, and the needs arising from national security objectives. It describes the normative and legislative framework of […]

Publication

Cybersecurity Capacity Building and Donor Coordination in the Western Balkans

Authors

Year

  • 2021

Description

  • This discussion paper explores how cyber capacity building actors and initiatives in the Western Bal…

 

Cybersecurity Capacity Building and Donor Coordination in the Western Balkans

This discussion paper explores how cyber capacity building actors and initiatives in the Western Balkans could be better coordinated, while considering the barriers to reaching cyber maturity in the region. Firstly, the paper offers a brief overview of projects, donors, and implementing organisations active in the Western Balkans, based on […]

Publication

Cybersecurity Policy Development and Capacity Building: Increasing regional cooperation in the Western Balkans

Authors

Year

  • 2021

Description

  • This paper identifies the ways in which closer regional collaboration is beneficial for building res…

 

Cybersecurity Policy Development and Capacity Building: Increasing regional cooperation in the Western Balkans

This paper identifies the ways in which closer regional collaboration is beneficial for building resilience, enhancing regional cybersecurity and enhancing strategic communication, collaboration and partnerships. The cybersecurity workforce shortage, skills gap and slow progress in public administration reforms are significant concerns for economic development and national security in the region, […]

Tool

Cyber Hygiene Course for Civil Servants

Authors

Year

  • 2022

Description

  • This course provides a simple, practical, 60-minute training for civil servants of all levels and pr…

 

Cyber Hygiene Course for Civil Servants

This course provides a simple, practical, 60-minute training for civil servants of all levels and profiles who, as part of their work, deal with official data and various types of information, and use computers and other IT equipment in the performance of their official duties. It is relevant for existing […]

Publication

Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach

Authors

Year

  • 2021

Description

  • This publication focuses on the Western Balkan region and seeks to portray this important issue thro…

 

Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach

This publication focuses on the Western Balkan region and seeks to portray this important issue through vivid case studies from Albania, Bosnia and Herzegovina, and Serbia. While each case study is unique, the stories of the women portrayed in them are symbolic of the struggles many women around the world […]

328

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.