Cyber Security Policy and Strategy

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 200 results

   
   
Publication

Cybersecurity Economics for Emerging Markets

Authors

Year

  • 2024

Description

  • In our increasingly interconnected world, where digital technologies are rapidly transforming multip…

 

Cybersecurity Economics for Emerging Markets

In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]

Tool

Geneva Dialogue – Cyber Quest

Authors

Year

  • 2025

Description

  • This online role-play simulation is designed for diplomats and professionals directly engaged in sha…

 

Geneva Dialogue – Cyber Quest

This online role-play simulation is designed for diplomats and professionals directly engaged in shaping global cybersecurity policy through the UN Open-ended Working Group (OEWG), and other related processes. The goal of this game is to connect cyber-norms and confidence-building measures (CBMs) to the practice through a practical a case of […]

Publication

Private-public initiatives for cybersecurity: the case of Ukraine

Authors

Year

  • 2024

Description

  • Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian c…

 

Private-public initiatives for cybersecurity: the case of Ukraine

Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian cyber aggression since the invasion of February 2022. During the period, Ukraine has been provided with significant levels of cyber defence support by allied governments and private sector companies. Through expert interviews and roundtables, the […]

Tool

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

Authors

Year

  • 2024

Description

  • This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …

 

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]

Publication

Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online

Authors

Year

  • 2025

Description

  • The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 …

 

Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online

The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 presents the key findings from this year’s discussions held in Riyadh, Saudi Arabia. The report delves into the main concerns of cybersecurity and trust, drawing from a series of community consultations that shaped the […]

Publication

A Handbook for the Practice of Cyber Diplomacy

Authors

Year

  • 2025

Description

  • A Handbook for the Practice of Cyber Diplomacy serves as a practical guide for future diplomats nav…

 

A Handbook for the Practice of Cyber Diplomacy

A Handbook for the Practice of Cyber Diplomacy serves as a practical guide for future diplomats navigating this rapidly evolving field. While progress has been made, cyber diplomacy remains a young field of international relations. This handbook equips new generations of cyber diplomats with foundational understandings, with an emphasis on the […]

Publication

Responsible cyber behaviour in the Indo-Pacific

Authors

Year

  • 2025

Description

  • At a time when international discussions on security and collaboration in cyberspace are under press…

 

Responsible cyber behaviour in the Indo-Pacific

At a time when international discussions on security and collaboration in cyberspace are under pressure from deepening strategic competition, there’s a serious need to develop a deeper understanding of how other states understand what it means to be a responsible cyber actor. This report contributes to that conversation by presenting […]

Tool

EU Policy Centre Digital Playbook

Authors

Year

  • 2024

Description

  • In light of the increasing complexity of the EU digital and cyber legislative landscape, there is a …

 

EU Policy Centre Digital Playbook

In light of the increasing complexity of the EU digital and cyber legislative landscape, there is a compelling need to explore the new market opportunities opened by EU legislations and identify intersections and synergies among their requirements. Considering the broad scope of the EU cyber and digital legislation, the Playbook […]

Publication

Navigating the Quantum Wave: A Policy Maker’s Guide for Responsible Governance of Quantum Technologies

Authors

Year

  • 2024

Description

  • This policy paper, written by Drifa Atladóttir and published by the ICT4Peace Foundation, explores …

 

Navigating the Quantum Wave: A Policy Maker’s Guide for Responsible Governance of Quantum Technologies

This policy paper, written by Drifa Atladóttir and published by the ICT4Peace Foundation, explores the opportunities and challenges presented by quantum technologies. It examines the governance frameworks needed to ensure these technologies deliver positive outcomes for society and the economy. Drawing on insights from experts in various quantum fields, an […]

Publication

Cyber ASEAN Report

Authors

Year

  • 2024

Description

  • This report is divided into two interlinked sections: Foundation and Application. Setting the contex…

 

Cyber ASEAN Report

This report is divided into two interlinked sections: Foundation and Application. Setting the context for the report, Part I: Foundation tackles the “so-what” of Cyber ASEAN, specifically the need to reimagine the conduct of cyber capacity-building in Southeast Asia. The report examines the evolution of cybersecurity cooperation in ASEAN before […]

Publication

Principles for state approaches to commercial cyber intrusion capabilities

Authors

Year

  • 2024

Description

  • The rapid growth of markets in which cyber intrusion capabilities can be bought and sold as products…

 

Principles for state approaches to commercial cyber intrusion capabilities

The rapid growth of markets in which cyber intrusion capabilities can be bought and sold as products and services by states, companies and criminals raises thorny policy challenges that are not adequately addressed by existing concepts of legitimate and illegitimate use. This paper explores these challenges, and puts forward a […]

Publication

National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent

Authors

Year

  • 2023

Description

  • This strategy, published by the Office of the National Cyber Director, Executive Office of the Presi…

 

National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent

This strategy, published by the Office of the National Cyber Director, Executive Office of the President, in July 2023, is grounded in the U.S. President’s National Cybersecurity Strategy (NCS) from March 2023. It outlines a plan to strengthen the nation’s cyber workforce, connect individuals to well-paying, quality jobs, and enhance […]

Publication

Global Cyber Expertise Magazine – Issue 12 – September 2024

Authors

Year

  • 2024

Description

  • The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights …

 

Global Cyber Expertise Magazine – Issue 12 – September 2024

The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights on global cyber capacity-building initiatives, policies, and developments. This issue highlights the vital work being carried out to secure critical infrastructures and digital economies worldwide. Featured content includes expert interviews and in-depth analyses on key cybersecurity […]

Publication

Accountability in Cyberspace: Lessons from and for Latin America

Authors

Year

  • 2024

Description

  •   In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspa…

 

Accountability in Cyberspace: Lessons from and for Latin America

  In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspace, drawing insights relevant to Latin America. As governments increasingly depend on third-party solutions in a privatized cybersecurity market, the notion of cyber accountability should be viewed as a shared responsibility. However, the first section of […]

Publication

Cyber Accountability Building

Authors

Year

  • 2024

Description

  • This paper from Andrea Calderaro emphasizes the critical role of capacity in establishing accountabi…

 

Cyber Accountability Building

This paper from Andrea Calderaro emphasizes the critical role of capacity in establishing accountability in cyberspace. It argues that for states to implement norms of responsible behavior, they must develop technical capabilities, access to information, and institutional resources. While capacity-building efforts have primarily targeted nation-states, the paper advocates for a […]

185

more brilliant tools and publications this way

1 2 3 14

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.