Tool
CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs
Authors
Year
- 2025
Description
- This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…
CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs
This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”, a maturity baseline developed from the SIM3 model2 created by the Open CSIRT Foundation (OCF), an internationally recognized model for assessing the maturity of security teams. CSIRTAmericas Baseline serves to help organizations assess the readiness of their cyber incident […]
Publication
CyberCAN: Cybersecurity for Cities and Nonprofits
Authors
Year
- 2024
Description
- A new CLTC report provides guidance to help government leaders in San Francisco and other cities mor…
CyberCAN: Cybersecurity for Cities and Nonprofits
A new CLTC report provides guidance to help government leaders in San Francisco and other cities more effectively support the digital security of local nonprofits. The report, “CyberCAN: Cybersecurity for Cities and Nonprofits,” was produced as part of Cybersecurity for Cities and Nonprofits (CyberCAN), an innovative research partnership between CLTC […]
Publication
National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent
Authors
Year
- 2023
Description
- This strategy, published by the Office of the National Cyber Director, Executive Office of the Presi…
National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent
This strategy, published by the Office of the National Cyber Director, Executive Office of the President, in July 2023, is grounded in the U.S. President’s National Cybersecurity Strategy (NCS) from March 2023. It outlines a plan to strengthen the nation’s cyber workforce, connect individuals to well-paying, quality jobs, and enhance […]
Publication
The NIST Cybersecurity Framework 2.0
Authors
Year
- 2024
Description
- The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and o…
The NIST Cybersecurity Framework 2.0
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization — regardless of its size, sector, or maturity — to better understand, assess, prioritize, and communicate […]
Publication
The Partners in the Blue Pacific P4C Outcomes Report
Authors
Year
- 2024
Description
- The inaugural Partners in the Blue Pacific (PFP) Pacific for Cyber Capacity Building and Coordinatio…
The Partners in the Blue Pacific P4C Outcomes Report
The inaugural Partners in the Blue Pacific (PFP) Pacific for Cyber Capacity Building and Coordination (P4C) was held in Nadi, Fiji from 2nd to 4th of October 2023. Over 80 representatives gathered from the Pacific island countries, PBP member countries and non-government stakeholders to facilitate a Pacific centred dialogue to […]
Publication
Cyber Resilience in the Electricity Industry: Analysis and Recommendations on Regulatory Practices for the Public and Private Sectors
Year
- 2020
Description
- A variety of threat actors continually target power utilities, seeking to profit financially or othe…
Cyber Resilience in the Electricity Industry: Analysis and Recommendations on Regulatory Practices for the Public and Private Sectors
A variety of threat actors continually target power utilities, seeking to profit financially or otherwise cause harm using attack vectors such as ransomware or by disrupting the availability of critical functions as cyberattacks on critical infrastructure were ranked the fifth top risk in 2020 for multiple sectors, including energy. To […]
Publication
Building a Skilled Cyber Security Workforce in Five Countries
Year
- 2023
Description
- The number of cyber security incidents is on the rise and cyber security professionals are in high d…
Building a Skilled Cyber Security Workforce in Five Countries
The number of cyber security incidents is on the rise and cyber security professionals are in high demand. Countries face a significant shortage of qualified persons. To inform policy makers and firms of the market on cyber security skills, data and up-to-date information is needed. As part of the OECD […]
Publication
Cyber Maturity in the Asia-Pacific region (2016)
Authors
Year
- 2016
Description
- This report is the third edition of an annual report examining cyber maturity trends across the Asia…
Cyber Maturity in the Asia-Pacific region (2016)
This report is the third edition of an annual report examining cyber maturity trends across the Asia–Pacific. It surveys a wide geographical and economic cross-section of the region, encompassing 23 countries from South, North and Southeast Asia, the South Pacific and North America. The ICPC has developed a ‘cyber maturity […]
Publication
Cyber Maturity in the Asia-Pacific Region (2015)
Authors
Year
- 2015
Description
- This report is the second edition of an annual report examining cyber maturity trends across the Asi…
Cyber Maturity in the Asia-Pacific Region (2015)
This report is the second edition of an annual report examining cyber maturity trends across the Asia–Pacific. It analyses the cyber maturity of 20 countries, which make up a wide geographical and economic cross-section of the region. To gain a more holistic picture of regional developments, this year’s maturity metric […]
Publication
Cyber Maturity in the Asia-Pacific Region (2014)
Authors
Year
- 2014
Description
- The Australian Strategic Policy Institute’s International Cyber Policy Centre has developed a Matu…
Cyber Maturity in the Asia-Pacific Region (2014)
The Australian Strategic Policy Institute’s International Cyber Policy Centre has developed a Maturity Metric which provides an assessment of the regional cyber landscape. This measurement encompasses an evaluation of whole-of-government policy and legislative structures, military organisation, business and digital economic strength and levels of cyber social awareness. This report analyses […]
Publication
Low Hanging Fruit: Evidence-Based Solutions to the Digital Evidence Challenge
Authors
Year
- 2018
Description
- The report, written by William A. Carter, Deputy Director and Fellow, CSIS Technology Policy Program…
Low Hanging Fruit: Evidence-Based Solutions to the Digital Evidence Challenge
The report, written by William A. Carter, Deputy Director and Fellow, CSIS Technology Policy Program, and Jennifer Daskal, Associate Professor of Law, American University, examines the challenges and opportunities faced by law enforcement in accessing and leveraging digital evidence. It provides recommendations for Congress, law enforcement, and service providers to […]
Publication
Canada – National Cyber Threat Assessment 2020
Authors
Year
- 2020
Description
- Canadian individuals and organizations increasingly rely on the Internet for daily activities. In a …
Canada – National Cyber Threat Assessment 2020
Canadian individuals and organizations increasingly rely on the Internet for daily activities. In a COVID-19 context, this trend has accelerated to enable Canadians to work, shop, and socialize remotely in accordance with public health physical distancing guidelines. However, as devices, information, and activities move online, they are vulnerable to cyber […]
Publication
A Roadmap to Strengthen US Cyber Enforcement
Authors
Year
- 2020
Description
- The following report is the result of a multiyear effort to define concrete steps to improve the US …
A Roadmap to Strengthen US Cyber Enforcement
The following report is the result of a multiyear effort to define concrete steps to improve the US government’s ability to tackle the scourge of cybercrime by better identifying perpetrators and imposing meaningful consequences on them and those behind their actions. A more complete PDF version of this report, including further […]
Tool
nCSIRT Guide – Self Help
Authors
Year
- 2021
Description
- This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonweal…
nCSIRT Guide – Self Help
This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonwealth countries continue to develop cybersecurity systems.
Publication
Software Supply Chain Attacks | CISA & NIST
Authors
Year
- 2021
Description
- The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of…
Software Supply Chain Attacks | CISA & NIST
The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF) […]