Tool
Introduction to Tabletop Exercises: a Practical Guidebook for Organizations
Authors
Year
- 2023
Description
- This publication seeks to provide guidance in designing, developing and evaluating how and when to c…
Introduction to Tabletop Exercises: a Practical Guidebook for Organizations
This publication seeks to provide guidance in designing, developing and evaluating how and when to conduct a tabletop exercise as a tool to improve an organization’s cyber security policymaking and operations capacities. The guide aims to offer a public-private cross organizational scope. Therefore, it is not written from a strictly […]
Publication
Cyber Incident Classification: A Report on Emerging Practices within the OSCE region
Authors
Year
- 2022
Description
- The report highlights emerging practices in national classification of cyber incidents by underlinin…
Cyber Incident Classification: A Report on Emerging Practices within the OSCE region
The report highlights emerging practices in national classification of cyber incidents by underlining commonalities in existing approaches to cyber incident classification among OSCE participating States and identifying limitations in this process. Although experiences in developing cyber incident classification systems are diverse across participating States, the knowledge derived from these processes […]
Tool
.auCHECK
Authors
Year
- 2022
Description
- .auCheck is an initiative of the Australian Strategic Policy Institute (ASPI) in cooperation with au…
.auCHECK
.auCheck is an initiative of the Australian Strategic Policy Institute (ASPI) in cooperation with auDA. .auCheck provides a series of tests that check whether internet services follow standards advised by the Australian government and are up to date. .auCheck is a non-commercial, independent and free service. Our mission is to […]
Tool
Mutually Agreed Norms for Routing Security (MANRS)
Authors
Year
- 2014
Description
- Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Interne…
Mutually Agreed Norms for Routing Security (MANRS)
Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. MANRS offers specific actions via four programs for Network Operators, Internet Exchange Points, CDN and Cloud Providers, and Equipment Vendors.
Tool
NetBeacon
Authors
Year
- 2022
Description
- NetBeacon is a tool created by the DNS Abuse Institute to empower individuals and organizations to r…
NetBeacon
NetBeacon is a tool created by the DNS Abuse Institute to empower individuals and organizations to report suspected online abuse and to empower registrars to take action against online abuse. NETBEACON’S MISSION IS TWOFOLD: Make it easy for people to report online abuse. Make it easy for industry to act […]
Tool
Knowledge-sharing and Instantiating Norms for DNS and Naming Security (KINDNS)
Authors
Year
- 2022
Description
- KINDNS is an ICANN initiative to promote voluntary security best practices for authoritative and rec…
Knowledge-sharing and Instantiating Norms for DNS and Naming Security (KINDNS)
KINDNS is an ICANN initiative to promote voluntary security best practices for authoritative and recursive DNS operators. It relies on a self-assessment tool that walks users through a series of questions to help them understand where they are positioned in the scale of the practices that the framework promotes. To develop a […]
Publication
Compendio de Ciberdelincuencia Organizada
Authors
Year
- 2022
Description
- El presente compendio tiene como objectivo mostrar la forma en que sistemas de justicia de penal de …
Compendio de Ciberdelincuencia Organizada
El presente compendio tiene como objectivo mostrar la forma en que sistemas de justicia de penal de todo el mundo han respondido a la ciberdelincuencia organizada. Tiene un alcance mundial e intenta, en la medida de lo posible, que haya una representación equitativa de casos de diferentes regiones geográficas y […]
Publication
Ukraine Cybersecurity Governance Assessment
Authors
Year
- 2021
Description
- This report is a two-factor analysis of cybersecurity: the legislative framework, and key national a…
Ukraine Cybersecurity Governance Assessment
This report is a two-factor analysis of cybersecurity: the legislative framework, and key national actors in cybersecurity. It describes the main cybersecurity threats in Ukraine and the needs arising from its national security objectives. The present assessment paper describes the normative and legislative framework of the Ukraine, which covers the […]
Publication
Georgia Cybersecurity Governance Assessment
Authors
Year
- 2021
Description
- This report is a two-factor analysis of cybersecurity: the legislative framework and key national ac…
Georgia Cybersecurity Governance Assessment
This report is a two-factor analysis of cybersecurity: the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in Georgia and the needs arising from national security objectives. It describes the normative and legislative framework of Georgia covering the main […]
Publication
Azerbaijan Cybersecurity Governance Assessment
Authors
Year
- 2021
Description
- This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…
Azerbaijan Cybersecurity Governance Assessment
This report is a two-factor analysis of cybersecurity, including the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in Azerbaijan and the needs arising from national security objectives. It describes the normative and legislative framework of Azerbaijan which covers […]
Publication
Armenia Cybersecurity Governance Assessment
Authors
Year
- 2021
Description
- This report is a two-factor analysis of cybersecurity, including the legislative framework and key n…
Armenia Cybersecurity Governance Assessment
This report is a two-factor analysis of cybersecurity, including the legislative framework and key national actors in cybersecurity. The first part of the report presents the main cybersecurity threats in the Republic of Armenia, and the needs arising from national security objectives. It describes the normative and legislative framework of […]
Publication
Cybersecurity Capacity Building and Donor Coordination in the Western Balkans
Authors
Year
- 2021
Description
- This discussion paper explores how cyber capacity building actors and initiatives in the Western Bal…
Cybersecurity Capacity Building and Donor Coordination in the Western Balkans
This discussion paper explores how cyber capacity building actors and initiatives in the Western Balkans could be better coordinated, while considering the barriers to reaching cyber maturity in the region. Firstly, the paper offers a brief overview of projects, donors, and implementing organisations active in the Western Balkans, based on […]
Publication
Cybersecurity Policy Development and Capacity Building: Increasing regional cooperation in the Western Balkans
Authors
Year
- 2021
Description
- This paper identifies the ways in which closer regional collaboration is beneficial for building res…
Cybersecurity Policy Development and Capacity Building: Increasing regional cooperation in the Western Balkans
This paper identifies the ways in which closer regional collaboration is beneficial for building resilience, enhancing regional cybersecurity and enhancing strategic communication, collaboration and partnerships. The cybersecurity workforce shortage, skills gap and slow progress in public administration reforms are significant concerns for economic development and national security in the region, […]
Tool
Cyber Hygiene Course for Civil Servants
Authors
Year
- 2022
Description
- This course provides a simple, practical, 60-minute training for civil servants of all levels and pr…
Cyber Hygiene Course for Civil Servants
This course provides a simple, practical, 60-minute training for civil servants of all levels and profiles who, as part of their work, deal with official data and various types of information, and use computers and other IT equipment in the performance of their official duties. It is relevant for existing […]
Publication
Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach
Authors
Year
- 2021
Description
- This publication focuses on the Western Balkan region and seeks to portray this important issue thro…
Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach
This publication focuses on the Western Balkan region and seeks to portray this important issue through vivid case studies from Albania, Bosnia and Herzegovina, and Serbia. While each case study is unique, the stories of the women portrayed in them are symbolic of the struggles many women around the world […]