CBMs, Norms and Cyberdiplomacy

This topic is part of Cyber Security Policy and Strategy
  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 74 results

   
   
Tool

Geneva Dialogue – Cyber Quest

Authors

Year

  • 2025

Description

  • This online role-play simulation is designed for diplomats and professionals directly engaged in sha…

 

Geneva Dialogue – Cyber Quest

This online role-play simulation is designed for diplomats and professionals directly engaged in shaping global cybersecurity policy through the UN Open-ended Working Group (OEWG), and other related processes. The goal of this game is to connect cyber-norms and confidence-building measures (CBMs) to the practice through a practical a case of […]

Tool

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

Authors

Year

  • 2024

Description

  • This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …

 

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]

Publication

A Handbook for the Practice of Cyber Diplomacy

Authors

Year

  • 2025

Description

  • A Handbook for the Practice of Cyber Diplomacy serves as a practical guide for future diplomats nav…

 

A Handbook for the Practice of Cyber Diplomacy

A Handbook for the Practice of Cyber Diplomacy serves as a practical guide for future diplomats navigating this rapidly evolving field. While progress has been made, cyber diplomacy remains a young field of international relations. This handbook equips new generations of cyber diplomats with foundational understandings, with an emphasis on the […]

Publication

Responsible cyber behaviour in the Indo-Pacific

Authors

Year

  • 2025

Description

  • At a time when international discussions on security and collaboration in cyberspace are under press…

 

Responsible cyber behaviour in the Indo-Pacific

At a time when international discussions on security and collaboration in cyberspace are under pressure from deepening strategic competition, there’s a serious need to develop a deeper understanding of how other states understand what it means to be a responsible cyber actor. This report contributes to that conversation by presenting […]

Publication

Principles for state approaches to commercial cyber intrusion capabilities

Authors

Year

  • 2024

Description

  • The rapid growth of markets in which cyber intrusion capabilities can be bought and sold as products…

 

Principles for state approaches to commercial cyber intrusion capabilities

The rapid growth of markets in which cyber intrusion capabilities can be bought and sold as products and services by states, companies and criminals raises thorny policy challenges that are not adequately addressed by existing concepts of legitimate and illegitimate use. This paper explores these challenges, and puts forward a […]

Publication

Global Cyber Expertise Magazine – Issue 12 – September 2024

Authors

Year

  • 2024

Description

  • The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights …

 

Global Cyber Expertise Magazine – Issue 12 – September 2024

The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights on global cyber capacity-building initiatives, policies, and developments. This issue highlights the vital work being carried out to secure critical infrastructures and digital economies worldwide. Featured content includes expert interviews and in-depth analyses on key cybersecurity […]

Publication

Cyber Accountability Building

Authors

Year

  • 2024

Description

  • This paper from Andrea Calderaro emphasizes the critical role of capacity in establishing accountabi…

 

Cyber Accountability Building

This paper from Andrea Calderaro emphasizes the critical role of capacity in establishing accountability in cyberspace. It argues that for states to implement norms of responsible behavior, they must develop technical capabilities, access to information, and institutional resources. While capacity-building efforts have primarily targeted nation-states, the paper advocates for a […]

Publication

Deterrence and Accountability

Authors

Year

  • 2024

Description

  • In cyberspace, the effectiveness of deterrence remains contested. Deterrence involves influencing ad…

 

Deterrence and Accountability

In cyberspace, the effectiveness of deterrence remains contested. Deterrence involves influencing adversary behavior in a way that prevents them from engaging in malicious acts. Deterrence necessitates similar conditions as accountability, such as transparency, openness, and the ability to impose consequences for undesirable behavior. To explore the relationship between accountability and […]

Publication

Advancing Accountability in Cyberspace: Models, Mechanisms, and Multistakeholder Approaches

Authors

Year

  • 2024

Description

  • This report, a product of Stimson’s Cyber Accountability Project, presents findings from a two-yea…

 

Advancing Accountability in Cyberspace: Models, Mechanisms, and Multistakeholder Approaches

This report, a product of Stimson’s Cyber Accountability Project, presents findings from a two-year research effort aimed at improving international cyber accountability and deterring malicious cyber activities. Led by Allison Pytlak, James Siebens, and a team of experts, the project draws parallels between cyberspace and other threat domains, such as […]

Publication

Opening up or closing down? Non-state actors in UN cybersecurity governance

Year

  • 2024

Description

  • How can we explain the varying participation of non-state actors in UN cybersecurity governance? Whi…

 

Opening up or closing down? Non-state actors in UN cybersecurity governance

How can we explain the varying participation of non-state actors in UN cybersecurity governance? While research often underlines the importance of non-state actors in governing cybersecurity, research on international non-state actors’ activities also shows that shrinking spaces reduce opportunities for these actors. So far, we do not know how these […]

Publication

Building Bridges in Cyber Diplomacy: How Brazil Shaped Global Cyber Norms

Year

  • 2024

Description

  • This publication explores the international forums where states formulate cyber norms—guidelines f…

 

Building Bridges in Cyber Diplomacy: How Brazil Shaped Global Cyber Norms

This publication explores the international forums where states formulate cyber norms—guidelines for the use of information and communication technologies by governments. It delves into the emerging field of cyber diplomacy with a focus on Brazil, an often-overlooked but crucial player. While the global debate is largely framed by the West […]

Publication

Understanding the importance of international cyber capacity building

Authors

Year

  • 2022

Description

  • Having national ‘cyber capacity’ is important, since it enables states to harness the benefits o…

 

Understanding the importance of international cyber capacity building

Having national ‘cyber capacity’ is important, since it enables states to harness the benefits of digitisation, while protecting a country’s assets and resilience. With this in mind, many of the world’s ‘cyber powers’ are now directing attention and resources to international cyber capacity building – that is, assisting partnered and […]

Publication

Assessing the Effectiveness of Cyber Defense Assistance

Authors

Year

  • 2024

Description

  • This report aims to provide a framework to evaluate CDA effectiveness. After two years of CDA to Ukr…

 

Assessing the Effectiveness of Cyber Defense Assistance

This report aims to provide a framework to evaluate CDA effectiveness. After two years of CDA to Ukraine, one organization at the forefront of CDA in Ukraine is the Cyber Defense Assistance Collaborative (CDAC). CDAC’s ongoing convenings of a wide range of governmental and private sector stakeholders indicate that no […]

Publication

Accelerating ICT Security Capacity-Building – Take Aways from the Global Roundtable on ICT Security Capacity-Building

Authors

Year

  • 2024

Description

  • The Global Roundtable on ICT Security Capacity-Building, held in New York on 10 May 2024, was the fi…

 

Accelerating ICT Security Capacity-Building – Take Aways from the Global Roundtable on ICT Security Capacity-Building

The Global Roundtable on ICT Security Capacity-Building, held in New York on 10 May 2024, was the first event organized under United Nations auspices dedicated to the issue of capacity building. It provided a unique platform for Member States, intergovernmental organizations, and multi-stakeholder representatives to discuss barriers and solutions for […]

Publication

A principles-based approach to cyber capacity-building (CCB)

Authors

Year

  • 2024

Description

  • In 2021, members of the UN Open-ended Working Group (OEWG) agreed 10 principles for cyber capacity-b…

 

A principles-based approach to cyber capacity-building (CCB)

In 2021, members of the UN Open-ended Working Group (OEWG) agreed 10 principles for cyber capacity-building (CCB). However, to date, the principles have not had the impact that was expected or hoped for. Part of the issue has been a lack of understanding of how best to utilize the principles […]

59

more brilliant tools and publications this way

1 2 3 5

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.