Tool
The Global CSIRT Maturity Framework
Authors
Year
- 2021
Description
- The Global CSIRT Maturity Framework is intended to contribute to the enhancement of global cyber inc…
The Global CSIRT Maturity Framework
The Global CSIRT Maturity Framework is intended to contribute to the enhancement of global cyber incident management capacity, with a focus on national CSIRTs. Cyber incidents and developments are inherently transnational and effective response is dependent upon transnational collaboration. The establishment of national CSIRTs is an essential step to facilitate […]
Publication
Understanding the Costs of Cybercrime: A Report of Key Findings from the Costs of Cyber Crime Working Group
Authors
Year
- 2018
Description
- The Serious and Organised Crime Strategy (Home Office, 2013a) therefore made a commitment to forman …
Understanding the Costs of Cybercrime: A Report of Key Findings from the Costs of Cyber Crime Working Group
The Serious and Organised Crime Strategy (Home Office, 2013a) therefore made a commitment to forman external Working Group to help to improve the quality of data associated with the costs of cyber crime. This reportdoes not attempt to arrive at an overall estimateof the cost of cyber crime. Rather, it […]
Publication
Pathways Into Cyber Crime
Authors
Year
- 2017
Description
- There are a number of young people in the UK that are becoming involved in cyber dependent crime. Cu…
Pathways Into Cyber Crime
There are a number of young people in the UK that are becoming involved in cyber dependent crime. Current understanding of pathways and motivations into this type of crime is limited. This report is limited by the relatively small number of debriefs involved. NCCU’s continuing debrief project will inform any […]
Publication
Serious and Organised Crime Strategy
Authors
Year
- 2018
Description
- The strategy builds on the 2015 National Security Strategy (NSS) and Strategic Defence and Security …
Serious and Organised Crime Strategy
The strategy builds on the 2015 National Security Strategy (NSS) and Strategic Defence and Security Review (SDSR), which identified serious and organised crime as a national security threat. It also reflects the findings and recommendations of the 2018 National Security Capability Review (NSCR).
Publication
Norms: From Articulation to Implementation
Authors
Year
- 2016
Description
- The global dialogue on cybersecurity norms is evolving from a conceptual discussion about nation-sta…
Norms: From Articulation to Implementation
The global dialogue on cybersecurity norms is evolving from a conceptual discussion about nation-states’ rights and responsibilities toward an articulation of norms of state and industry behavior. Stakeholders from governments, the private sector, academia, and civil society are putting forward myriad norms proposals, addressing a range of challenges caused by […]
Publication
International Cybersecurity Norms
Authors
Year
- 2014
Description
- International cybersecurity normsInternational Cybersecurity NormsMicrosoft Policy PapersThe case fo…
International Cybersecurity Norms
International cybersecurity normsInternational Cybersecurity NormsMicrosoft Policy PapersThe case for international cybersecurity normsAs societies expand their digital footprint, increasing connectivity among citizens, businesses, and governments, the world has also seen a concomitant increase in cyber incidents.At times, the attackers’ motivations are financial, not unlike criminal behavior in the “physical world.”The past […]
Publication
Norms for Cybersecurity in South East Asia
Authors
Year
- 2017
Description
- Broad adoption of cybersecurity norms can help promote social and economic development, as well as i…
Norms for Cybersecurity in South East Asia
Broad adoption of cybersecurity norms can help promote social and economic development, as well as improve the international security context in the Southeast Asian region by lending to the region’s stability and creating a solid footing for further harmonization of policies. This paper outlines the existing efforts around cybersecurity norms […]
Publication
Five Principles for Shaping Norms
Authors
Year
- 2013
Description
- Today states are under significant pressure to develop and maintain capabilities for defending the n…
Five Principles for Shaping Norms
Today states are under significant pressure to develop and maintain capabilities for defending the nation in cyberspace; maintaining appropriate intelligence capabilities; enforcing criminal law; and reducing risk in its critical infrastructures and its broader economy. As a result, the need for diplomatic dialogue among nations has reached a critical juncture. […]
Tool
Cyber Tech Accord
Authors
Year
- 2018
Description
- The online world has become a cornerstone of global society, important to virtually every aspect of …
Cyber Tech Accord
The online world has become a cornerstone of global society, important to virtually every aspect of our public infrastructure and private lives. As we look to the future, new online technologies will do even more to help address important societal challenges, from improving education and healthcare to advancing agriculture, business […]
Tool
Paris Call for Trust and Security in Cyberspace
Authors
Year
- 2018
Description
- The Paris Call for Trust and Security in Cyberspace of 12 November 2018 is a call to come together t…
Paris Call for Trust and Security in Cyberspace
The Paris Call for Trust and Security in Cyberspace of 12 November 2018 is a call to come together to face the new threats endangering citizens and infrastructure. It is based around nine common principles to secure cyberspace, which act as as many areas for discussion and action.
Tool
[Web Discussion Summary] Norms and Confidence Building Measures (CBMs): Are We There Yet?
Authors
Year
- 2019
Description
- DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Norms …
[Web Discussion Summary] Norms and Confidence Building Measures (CBMs): Are We There Yet?
DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Norms and confidence building measures (CBMs): Are we there yet? This webinar was the fourth in a series of cyber-diplomacy web discussions, following the web discussions: Cyber-armament: A heavy impact on peace, economic development, and human rights; Applicability of […]
Tool
[Web Discussion Summary] Traceability and Attribution of Cyber-Attacks: Who Did It?
Authors
Year
- 2019
Description
- DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Tracea…
[Web Discussion Summary] Traceability and Attribution of Cyber-Attacks: Who Did It?
DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Traceability and attribution of cyber-attacks: Who did it? This webinar was the third in a series of cyber-diplomacy web discussions, following the web discussions: Cyber-armament: A heavy impact on peace, economic development, and human rights and Applicability of international […]
Tool
[Web Discussion Summary] Applicability of International Law to Cyberspace: Do We Know the Rules of the Road?
Authors
Year
- 2019
Description
- DiploFoundation, with the support of Microsoft, organised the web discussion: Applicability of inter…
[Web Discussion Summary] Applicability of International Law to Cyberspace: Do We Know the Rules of the Road?
DiploFoundation, with the support of Microsoft, organised the web discussion: Applicability of international law to cyberspace: Do we know the rules of the road? This webinar was the second in the series of cyber-diplomacy web discussions, following the web discussion, Cyber-armament: A heavy impact on peace, economic development, and human […]
Tool
[Web Discussion Summary] Cyber-Armament: A Heavy Impact on Peace, Economic Development, and Human Rights
Authors
Year
- 2019
Description
- DiploFoundation, with the support of Microsoft, organised the web discussion: Cyber-armament: A heav…
[Web Discussion Summary] Cyber-Armament: A Heavy Impact on Peace, Economic Development, and Human Rights
DiploFoundation, with the support of Microsoft, organised the web discussion: Cyber-armament: A heavy impact on peace, economic development, and human rights. This webinar was the first in the series of cyber-diplomacy web discussions which aim to map trends; introduce challenges; clarify open issues on the negotiation table; outline processes where […]
Publication
Operational Guidance for the EU’s International Cooperation on Cyber Capacity Building
Authors
Year
- 2018
Description
- The Operational Guidance is intended to provide a comprehensive practical framework when designing a…
Operational Guidance for the EU’s International Cooperation on Cyber Capacity Building
The Operational Guidance is intended to provide a comprehensive practical framework when designing and implementing the EU’s external actions against cybercrime and for promoting cybersecurity and cyber resilience. The study was commissioned by the European Commission’s Directorate-General for International Cooperation and Development, Unit “Security, Nuclear Safety” and it was implemented […]