Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 406-420 of 538 results

   
   
Tool

The Global CSIRT Maturity Framework

Authors

Year

  • 2021

Description

  • The Global CSIRT Maturity Framework is intended to contribute to the enhancement of global cyber inc…

 

The Global CSIRT Maturity Framework

The Global CSIRT Maturity Framework is intended to contribute to the enhancement of global cyber incident management capacity, with a focus on national CSIRTs. Cyber incidents and developments are inherently transnational and effective response is dependent upon transnational collaboration. The establishment of national CSIRTs is an essential step to facilitate […]

Publication

Understanding the Costs of Cybercrime: A Report of Key Findings from the Costs of Cyber Crime Working Group

Authors

Year

  • 2018

Description

  • The Serious and Organised Crime Strategy (Home Office, 2013a) therefore made a commitment to forman …

 

Understanding the Costs of Cybercrime: A Report of Key Findings from the Costs of Cyber Crime Working Group

The Serious and Organised Crime Strategy (Home Office, 2013a) therefore made a commitment to forman external Working Group to help to improve the quality of data associated with the costs of cyber crime. This reportdoes not attempt to arrive at an overall estimateof the cost of cyber crime. Rather, it […]

Publication

Pathways Into Cyber Crime

Authors

Year

  • 2017

Description

  • There are a number of young people in the UK that are becoming involved in cyber dependent crime. Cu…

 

Pathways Into Cyber Crime

There are a number of young people in the UK that are becoming involved in cyber dependent crime. Current understanding of pathways and motivations into this type of crime is limited. This report is limited by the relatively small number of debriefs involved. NCCU’s continuing debrief project will inform any […]

Publication

Serious and Organised Crime Strategy

Authors

Year

  • 2018

Description

  • The strategy builds on the 2015 National Security Strategy (NSS) and Strategic Defence and Security …

 

Serious and Organised Crime Strategy

The strategy builds on the 2015 National Security Strategy (NSS) and Strategic Defence and Security Review (SDSR), which identified serious and organised crime as a national security threat. It also reflects the findings and recommendations of the 2018 National Security Capability Review (NSCR).

Publication

Norms: From Articulation to Implementation

Authors

Year

  • 2016

Description

  • The global dialogue on cybersecurity norms is evolving from a conceptual discussion about nation-sta…

 

Norms: From Articulation to Implementation

The global dialogue on cybersecurity norms is evolving from a conceptual discussion about nation-states’ rights and responsibilities toward an articulation of norms of state and industry behavior. Stakeholders from governments, the private sector, academia, and civil society are putting forward myriad norms proposals, addressing a range of challenges caused by […]

Publication

International Cybersecurity Norms

Authors

Year

  • 2014

Description

  • International cybersecurity normsInternational Cybersecurity NormsMicrosoft Policy PapersThe case fo…

 

International Cybersecurity Norms

International cybersecurity normsInternational Cybersecurity NormsMicrosoft Policy PapersThe case for international cybersecurity normsAs societies expand their digital footprint, increasing connectivity among citizens, businesses, and governments, the world has also seen a concomitant increase in cyber incidents.At times, the attackers’ motivations are financial, not unlike criminal behavior in the “physical world.”The past […]

Publication

Norms for Cybersecurity in South East Asia

Authors

Year

  • 2017

Description

  • Broad adoption of cybersecurity norms can help promote social and economic development, as well as i…

 

Norms for Cybersecurity in South East Asia

Broad adoption of cybersecurity norms can help promote social and economic development, as well as improve the international security context in the Southeast Asian region by lending to the region’s stability and creating a solid footing for further harmonization of policies. This paper outlines the existing efforts around cybersecurity norms […]

Publication

Five Principles for Shaping Norms

Authors

Year

  • 2013

Description

  • Today states are under significant pressure to develop and maintain capabilities for defending the n…

 

Five Principles for Shaping Norms

Today states are under significant pressure to develop and maintain capabilities for defending the nation in cyberspace; maintaining appropriate intelligence capabilities; enforcing criminal law; and reducing risk in its critical infrastructures and its broader economy. As a result, the need for diplomatic dialogue among nations has reached a critical juncture. […]

Tool

Cyber Tech Accord

Authors

Year

  • 2018

Description

  • The online world has become a cornerstone of global society, important to virtually every aspect of …

 

Cyber Tech Accord

The online world has become a cornerstone of global society, important to virtually every aspect of our public infrastructure and private lives. As we look to the future, new online technologies will do even more to help address important societal challenges, from improving education and healthcare to advancing agriculture, business […]

Tool

Paris Call for Trust and Security in Cyberspace

Authors

Year

  • 2018

Description

  • The Paris Call for Trust and Security in Cyberspace of 12 November 2018 is a call to come together t…

 

Paris Call for Trust and Security in Cyberspace

The Paris Call for Trust and Security in Cyberspace of 12 November 2018 is a call to come together to face the new threats endangering citizens and infrastructure. It is based around nine common principles to secure cyberspace, which act as as many areas for discussion and action.

Tool

[Web Discussion Summary] Norms and Confidence Building Measures (CBMs): Are We There Yet?

Authors

Year

  • 2019

Description

  • DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Norms …

 

[Web Discussion Summary] Norms and Confidence Building Measures (CBMs): Are We There Yet?

DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Norms and confidence building measures (CBMs): Are we there yet? This webinar was the fourth in a series of cyber-diplomacy web discussions, following the web discussions: Cyber-armament: A heavy impact on peace, economic development, and human rights; Applicability of […]

Tool

[Web Discussion Summary] Traceability and Attribution of Cyber-Attacks: Who Did It?

Authors

Year

  • 2019

Description

  • DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Tracea…

 

[Web Discussion Summary] Traceability and Attribution of Cyber-Attacks: Who Did It?

DiploFoundation, with the support of Microsoft, organised the Cyber-diplomacy web discussion: Traceability and attribution of cyber-attacks: Who did it? This webinar was the third in a series of cyber-diplomacy web discussions, following the web discussions: Cyber-armament: A heavy impact on peace, economic development, and human rights and Applicability of international […]

Tool

[Web Discussion Summary] Applicability of International Law to Cyberspace: Do We Know the Rules of the Road?

Authors

Year

  • 2019

Description

  • DiploFoundation, with the support of Microsoft, organised the web discussion: Applicability of inter…

 

[Web Discussion Summary] Applicability of International Law to Cyberspace: Do We Know the Rules of the Road?

DiploFoundation, with the support of Microsoft, organised the web discussion: Applicability of international law to cyberspace: Do we know the rules of the road?  This webinar was the second in the series of cyber-diplomacy web discussions, following the web discussion, Cyber-armament: A heavy impact on peace, economic development, and human […]

Tool

[Web Discussion Summary] Cyber-Armament: A Heavy Impact on Peace, Economic Development, and Human Rights

Authors

Year

  • 2019

Description

  • DiploFoundation, with the support of Microsoft, organised the web discussion: Cyber-armament: A heav…

 

[Web Discussion Summary] Cyber-Armament: A Heavy Impact on Peace, Economic Development, and Human Rights

DiploFoundation, with the support of Microsoft, organised the web discussion: Cyber-armament: A heavy impact on peace, economic development, and human rights. This webinar was the first in the series of cyber-diplomacy web discussions which aim to map trends; introduce challenges; clarify open issues on the negotiation table; outline processes where […]

Publication

Operational Guidance for the EU’s International Cooperation on Cyber Capacity Building

Authors

Year

  • 2018

Description

  • The Operational Guidance is intended to provide a comprehensive practical framework when designing a…

 

Operational Guidance for the EU’s International Cooperation on Cyber Capacity Building

The Operational Guidance is intended to provide a comprehensive practical framework when designing and implementing the EU’s external actions against cybercrime and for promoting cybersecurity and cyber resilience. The study was commissioned by the European Commission’s Directorate-General for International Cooperation and Development, Unit “Security, Nuclear Safety” and it was implemented […]

118

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.