Critical Information Infrastructure Protection

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 63 results

   
   
Publication

The Ransomware Playbook and How to Disrupt It

Authors

Year

  • 2025

Description

  • Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …

 

The Ransomware Playbook and How to Disrupt It

Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]

Publication

Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)

Authors

Year

  • 2024

Description

  • This cyber security guide aims to provide medium-sized companies with the necessary tools and strate…

 

Guide for Cyber crisis management in SMEs (Guía para la Gestión de Crisis de Cyberseguridad en Empresas)

This cyber security guide aims to provide medium-sized companies with the necessary tools and strategies to ensure the security and stability of their operations in the event of a cyber security crisis.

Tool

Geneva Dialogue – Cyber Quest

Authors

Year

  • 2025

Description

  • This online role-play simulation is designed for diplomats and professionals directly engaged in sha…

 

Geneva Dialogue – Cyber Quest

This online role-play simulation is designed for diplomats and professionals directly engaged in shaping global cybersecurity policy through the UN Open-ended Working Group (OEWG), and other related processes. The goal of this game is to connect cyber-norms and confidence-building measures (CBMs) to the practice through a practical a case of […]

Publication

Private-public initiatives for cybersecurity: the case of Ukraine

Authors

Year

  • 2024

Description

  • Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian c…

 

Private-public initiatives for cybersecurity: the case of Ukraine

Despite widespread fears at the time, Ukraine appears to have been effective in countering Russian cyber aggression since the invasion of February 2022. During the period, Ukraine has been provided with significant levels of cyber defence support by allied governments and private sector companies. Through expert interviews and roundtables, the […]

Publication

Guidelines and Companion Guide on Securing AI Systems

Authors

Year

  • 2024

Description

  • On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Secur…

 

Guidelines and Companion Guide on Securing AI Systems

On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Securing AI Systems and the accompanying Companion Guide to address cybersecurity risks associated with artificial intelligence (AI). These resources aim to ensure AI systems are secure by design and default, prioritizing safety, security, and responsible […]

Publication

CyberCAN: Cybersecurity for Cities and Nonprofits

Authors

Year

  • 2024

Description

  • A new CLTC report provides guidance to help government leaders in San Francisco and other cities mor…

 

CyberCAN: Cybersecurity for Cities and Nonprofits

A new CLTC report provides guidance to help government leaders in San Francisco and other cities more effectively support the digital security of local nonprofits. The report, “CyberCAN: Cybersecurity for Cities and Nonprofits,” was produced as part of Cybersecurity for Cities and Nonprofits (CyberCAN), an innovative research partnership between CLTC […]

Publication

Towards a Resilient Cyberspace in Southeast Asia

Authors

Year

  • 2023

Description

  • Authored by Keith Detros and published by the Tech for Good Institute (TFGI), the 2023 report “…

 

Towards a Resilient Cyberspace in Southeast Asia

Authored by Keith Detros and published by the Tech for Good Institute (TFGI), the 2023 report “Towards a Resilient Cyberspace in Southeast Asia” explores strategies to fortify cyber resilience within the SEA-6 region (Malaysia, Indonesia, Philippines, Thailand, Singapore, and Vietnam). As Southeast Asia’s digital economy rapidly expands, so do associated […]

Publication

Global Cyber Expertise Magazine – Issue 12 – September 2024

Authors

Year

  • 2024

Description

  • The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights …

 

Global Cyber Expertise Magazine – Issue 12 – September 2024

The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights on global cyber capacity-building initiatives, policies, and developments. This issue highlights the vital work being carried out to secure critical infrastructures and digital economies worldwide. Featured content includes expert interviews and in-depth analyses on key cybersecurity […]

Publication

Accountability in Cyberspace: Lessons from and for Latin America

Authors

Year

  • 2024

Description

  •   In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspa…

 

Accountability in Cyberspace: Lessons from and for Latin America

  In this research paper, Marie Louise Hurel explores the concept of accountability in cyberspace, drawing insights relevant to Latin America. As governments increasingly depend on third-party solutions in a privatized cybersecurity market, the notion of cyber accountability should be viewed as a shared responsibility. However, the first section of […]

Tool

ITU Global Cybersecurity Index (GCI) v5

Authors

Year

  • 2024

Description

  • The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…

 

ITU Global Cybersecurity Index (GCI) v5

The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]

Publication

11 Strategies of a World-Class Cybersecurity Operations Center

Authors

Year

  • 2022

Description

  • This second edition of the popular 10 Strategies of a World-Class Cybersecurity Operations Center fr…

 

11 Strategies of a World-Class Cybersecurity Operations Center

This second edition of the popular 10 Strategies of a World-Class Cybersecurity Operations Center from The MITRE Corporation includes new material and evolved thinking to bring a fresh approach to excelling at cybersecurity operations and enhancing cyber defenses. This publication addresses how to understand the mission context in which the […]

Tool

Technical Report – Cyber Security Resilience Assessment toolkit for DFS Critical Infrastructure

Authors

Year

  • 2023

Description

  • This report aims to support Digital Financial Services (DFS) regulators and DFS stakeholders in emer…

 

Technical Report – Cyber Security Resilience Assessment toolkit for DFS Critical Infrastructure

This report aims to support Digital Financial Services (DFS) regulators and DFS stakeholders in emerging economies in assessing their critical infrastructure’s cyber resilience level. The scope of this report is to provide DFS entities in emerging economies with technical guidelines and toolkit to conduct a self-assessment of their current cyber […]

Publication

Guide on Cyber Threat Intelligence

Authors

Year

  • 2024

Description

  • A newly published Guide from CREST looks into the different types of Cyber Threat Intelligence — C…

 

Guide on Cyber Threat Intelligence

A newly published Guide from CREST looks into the different types of Cyber Threat Intelligence — CTI – standalone deliverables and continued threat monitoring services – and crucially, how this discipline can be used to predict, prevent, detect and respond to threats. The updated Guide also includes new sections on […]

Publication

Best Practices for Cyber Crisis Management

Authors

Year

  • 2024

Description

  • This study highlights the complexities behind the notion of cyber crisis and the degree of subjectiv…

 

Best Practices for Cyber Crisis Management

This study highlights the complexities behind the notion of cyber crisis and the degree of subjectivity it involves. The elevation of a large-scale cyber incident into a cyber crisis relies predominantly on a political decision, and depends largely on the level of risk that EU Member States (MS) are prepared […]

Publication

Journal of Cyber Policy

Authors

Year

  • 2016

Description

  • The Journal of Cyber Policy has a strong emphasis on topics that are international in scope, and can…

 

Journal of Cyber Policy

The Journal of Cyber Policy has a strong emphasis on topics that are international in scope, and can address national and international cyber policy challenges. The challenges of the cyber world are cross-disciplinary, and the journal reflects this in the range of contributions that it solicits. The list of disciplines […]

48

more brilliant tools and publications this way

1 2 3 5

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.