North America

Countries in this region: Canada, United States
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 33 results

   
   
Tool

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

Authors

Year

  • 2025

Description

  • This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…

 

CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs

This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”, a maturity baseline developed from the SIM3 model2 created by the Open CSIRT Foundation (OCF), an internationally recognized model for assessing the maturity of security teams. CSIRTAmericas Baseline serves to help organizations assess the readiness of their cyber incident […]

Publication

CyberCAN: Cybersecurity for Cities and Nonprofits

Authors

Year

  • 2024

Description

  • A new CLTC report provides guidance to help government leaders in San Francisco and other cities mor…

 

CyberCAN: Cybersecurity for Cities and Nonprofits

A new CLTC report provides guidance to help government leaders in San Francisco and other cities more effectively support the digital security of local nonprofits. The report, “CyberCAN: Cybersecurity for Cities and Nonprofits,” was produced as part of Cybersecurity for Cities and Nonprofits (CyberCAN), an innovative research partnership between CLTC […]

Publication

National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent

Authors

Year

  • 2023

Description

  • This strategy, published by the Office of the National Cyber Director, Executive Office of the Presi…

 

National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent

This strategy, published by the Office of the National Cyber Director, Executive Office of the President, in July 2023, is grounded in the U.S. President’s National Cybersecurity Strategy (NCS) from March 2023. It outlines a plan to strengthen the nation’s cyber workforce, connect individuals to well-paying, quality jobs, and enhance […]

Publication

The NIST Cybersecurity Framework 2.0

Authors

Year

  • 2024

Description

  • The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and o…

 

The NIST Cybersecurity Framework 2.0

The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization — regardless of its size, sector, or maturity — to better understand, assess, prioritize, and communicate […]

Publication

The Partners in the Blue Pacific P4C Outcomes Report

Authors

Year

  • 2024

Description

  • The inaugural Partners in the Blue Pacific (PFP) Pacific for Cyber Capacity Building and Coordinatio…

 

The Partners in the Blue Pacific P4C Outcomes Report

The inaugural Partners in the Blue Pacific (PFP) Pacific for Cyber Capacity Building and Coordination (P4C) was held in Nadi, Fiji from 2nd to 4th of October 2023. Over 80 representatives gathered from the Pacific island countries, PBP member countries and non-government stakeholders to facilitate a Pacific centred dialogue to […]

Publication

Cyber Resilience in the Electricity Industry: Analysis and Recommendations on Regulatory Practices for the Public and Private Sectors

Year

  • 2020

Description

  • A variety of threat actors continually target power utilities, seeking to profit financially or othe…

 

Cyber Resilience in the Electricity Industry: Analysis and Recommendations on Regulatory Practices for the Public and Private Sectors

A variety of threat actors continually target power utilities, seeking to profit financially or otherwise cause harm using attack vectors such as ransomware or by disrupting the availability of critical functions as cyberattacks on critical infrastructure were ranked the fifth top risk in 2020 for multiple sectors, including energy. To […]

Publication

Building a Skilled Cyber Security Workforce in Five Countries

Year

  • 2023

Description

  • The number of cyber security incidents is on the rise and cyber security professionals are in high d…

 

Building a Skilled Cyber Security Workforce in Five Countries

The number of cyber security incidents is on the rise and cyber security professionals are in high demand. Countries face a significant shortage of qualified persons. To inform policy makers and firms of the market on cyber security skills, data and up-to-date information is needed. As part of the OECD […]

Publication

Cyber Maturity in the Asia-Pacific region (2016)

Authors

Year

  • 2016

Description

  • This report is the third edition of an annual report examining cyber maturity trends across the Asia…

 

Cyber Maturity in the Asia-Pacific region (2016)

This report is the third edition of an annual report examining cyber maturity trends across the Asia–Pacific. It surveys a wide geographical and economic cross-section of the region, encompassing 23 countries from South, North and Southeast Asia, the South Pacific and North America. The ICPC has developed a ‘cyber maturity […]

Publication

Cyber Maturity in the Asia-Pacific Region (2015)

Authors

Year

  • 2015

Description

  • This report is the second edition of an annual report examining cyber maturity trends across the Asi…

 

Cyber Maturity in the Asia-Pacific Region (2015)

This report is the second edition of an annual report examining cyber maturity trends across the Asia–Pacific. It analyses the cyber maturity of 20 countries, which make up a wide geographical and economic cross-section of the region. To gain a more holistic picture of regional developments, this year’s maturity metric […]

Publication

Cyber Maturity in the Asia-Pacific Region (2014)

Authors

Year

  • 2014

Description

  • The Australian Strategic Policy Institute’s International Cyber Policy Centre has developed a Matu…

 

Cyber Maturity in the Asia-Pacific Region (2014)

The Australian Strategic Policy Institute’s International Cyber Policy Centre has developed a Maturity Metric which provides an assessment of the regional cyber landscape. This measurement encompasses an evaluation of whole-of-government policy and legislative structures, military organisation, business and digital economic strength and levels of cyber social awareness. This report analyses […]

Publication

Low Hanging Fruit: Evidence-Based Solutions to the Digital Evidence Challenge

Authors

Year

  • 2018

Description

  • The report, written by William A. Carter, Deputy Director and Fellow, CSIS Technology Policy Program…

 

Low Hanging Fruit: Evidence-Based Solutions to the Digital Evidence Challenge

The report, written by William A. Carter, Deputy Director and Fellow, CSIS Technology Policy Program, and Jennifer Daskal, Associate Professor of Law, American University, examines the challenges and opportunities faced by law enforcement in accessing and leveraging digital evidence. It provides recommendations for Congress, law enforcement, and service providers to […]

Publication

Canada – National Cyber Threat Assessment 2020

Authors

Year

  • 2020

Description

  • Canadian individuals and organizations increasingly rely on the Internet for daily activities. In a …

 

Canada – National Cyber Threat Assessment 2020

Canadian individuals and organizations increasingly rely on the Internet for daily activities. In a COVID-19 context, this trend has accelerated to enable Canadians to work, shop, and socialize remotely in accordance with public health physical distancing guidelines. However, as devices, information, and activities move online, they are vulnerable to cyber […]

Publication

A Roadmap to Strengthen US Cyber Enforcement

Authors

Year

  • 2020

Description

  • The following report is the result of a multiyear effort to define concrete steps to improve the US …

 

A Roadmap to Strengthen US Cyber Enforcement

The following report is the result of a multiyear effort to define concrete steps to improve the US government’s ability to tackle the scourge of cybercrime by better identifying perpetrators and imposing meaningful consequences on them and those behind their actions. A more complete PDF version of this report, including further […]

Tool

nCSIRT Guide – Self Help

Authors

Year

  • 2021

Description

  • This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonweal…

 

nCSIRT Guide – Self Help

This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonwealth countries continue to develop cybersecurity systems.

Publication

Software Supply Chain Attacks | CISA & NIST

Authors

Year

  • 2021

Description

  • The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of…

 

Software Supply Chain Attacks | CISA & NIST

The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF) […]

18

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.