Tool
Cybersecurity Survival Guide
Authors
Year
- 2019
Description
- This guide is divided into the following modules: Module 1: Cybersecurity Foundation explains the na…
Cybersecurity Survival Guide
This guide is divided into the following modules: Module 1: Cybersecurity Foundation explains the nature and scope of today’s cybersecurity challenges. This module explores the cybersecurity landscape, cyberthreats, malware and spamming, and Wi-Fi and advanced threats. Module 2: Cybersecurity Gateway explains networking concepts, fundamentals, and technologies. This module explores the […]
Tool
Cybersecurity Awareness Campaign Toolkit
Authors
Year
- 2015
Description
- This toolkit is designed to provide governments or organizations guidance and resources for developi…
Cybersecurity Awareness Campaign Toolkit
This toolkit is designed to provide governments or organizations guidance and resources for developing a cybersecurity awareness campaign. Our goal is to help you think through your country’s needs for a cybersecurity awareness campaign and how to best achieve it whether you have aw large budget or limited resources. We […]
Tool
Focus Awareness-Building Through a Cybersecurity Awareness Month
Authors
Year
- 2017
Description
- The National Cybersecurity Awareness Month (NCSAM) is an example of a cybersecurity awareness campai…
Focus Awareness-Building Through a Cybersecurity Awareness Month
The National Cybersecurity Awareness Month (NCSAM) is an example of a cybersecurity awareness campaign at national level that builds on the attention provided by declaring a month dedicated to a specific topic to mobilise actors; raise the activity profile; and amplify communication, awareness, and capacity building activities. The campaign focuses […]
Tool
Align National Campaigns
Authors
Year
- 2017
Description
- Cooperation, alignment, and coordination with others is beneficial. In planning and organising an aw…
Align National Campaigns
Cooperation, alignment, and coordination with others is beneficial. In planning and organising an awareness campaign, it is advisable to coordinate with other existing national and international awareness campaigns. If stakeholders come together to share materials, and possibly align messages, the impact is amplified. Sharing materials and aligning campaign messages helps […]
Tool
IBM X-Force Exchange
Authors
Year
- 2015
Description
- IBM® X-Force Exchange is a cloud-based, threat intelligence sharing platform that you can use to ra…
IBM X-Force Exchange
IBM® X-Force Exchange is a cloud-based, threat intelligence sharing platform that you can use to rapidly research the latest global security threats, aggregate actionable intelligence, consult with experts and collaborate with peers. IBM X-Force Exchange, supported by human- and machine-generated intelligence, leverages the scale of IBM X-Force to help users […]
Tool
The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers
Authors
Year
- 2017
Description
- Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. …
The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers
Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. Nations at large critically depend on Critical Infrastructure (CI) services such as energy supply, telecommunications, financial systems, drinking water, and governmental services. Information and communication technologies(ICT)-based services are becoming increasingly important for the functioning of CI. Disruption […]
Tool
GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)
Authors
Year
- 2017
Description
- Some elements of ICT have become critical for national security. These elements form the Critical …
GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)
Some elements of ICT have become critical for national security. These elements form the Critical Information Infrastructure (CII) of a nation. Protection of CII (CIIP) has obtained worldwide attention which has, for example, resulted in a OECD high-level policy framework (2008) containing recommendations on the Protection of Critical Information Infrastructure. […]
Tool
Produce and Present Trusted Metrics about Systemic Risk Conditions
Authors
Year
- 2017
Description
- A statistics platform, featuring metrics and data visualisation, allows for the measurement of key i…
Produce and Present Trusted Metrics about Systemic Risk Conditions
A statistics platform, featuring metrics and data visualisation, allows for the measurement of key indicators of malicious activity and risk conditions, and enables analytical insight about patterns, priorities, and trends for action. Such intelligence can be used by the CERT/CSIRT community, security sector, corporations, and organisations. If the metrics are […]
Tool
Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks
Authors
Year
- 2017
Description
- Internet networks are replete with systemic vulnerabilities. CERTs and other trusted operators req…
Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks
Internet networks are replete with systemic vulnerabilities. CERTs and other trusted operators require reliable information about their network’s health over time. Various organisations have set up systems to scan networks for vulnerabilities and/or monitor cyber-attacks. Many of these sources are open, but their provenance and collection processes are often opaque. […]
Publication
Harnessing the Internet of Things for Global Development
Authors
Year
- 2016
Description
- This report explores the current use and potential of Internet of Things (IoT) technologies in tackl…
Harnessing the Internet of Things for Global Development
This report explores the current use and potential of Internet of Things (IoT) technologies in tackling global development challenges, highlighting a number of specific instances where IoT interventions are helping to solve some of the world’s most pressing issues . It presents summary conclusions on what is required for the […]
Publication
An Internet of Things Reference of Architecture
Authors
Year
- 2016
Description
- The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices…
An Internet of Things Reference of Architecture
The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices deliver new experiences to people throughout the world, lowering costs, sometimes by billions ofdollars. Examples include connected cars, robotic manufacturing, smarter medical equipment, smart grid, and countless industrial control systems. Unfortunately, this growth in connected […]
Publication
IoT Security Standards Gap Analysis
Authors
Year
- 2019
Description
- This study analyses the gaps and provides guidelines for, in particular, the development or repositi…
IoT Security Standards Gap Analysis
This study analyses the gaps and provides guidelines for, in particular, the development or repositioning of standards, facilitating the adoption of standards and governance of EU standardisation in the area of NIS. Source – ENISA website
Publication
IoT Security Whitepaper 2018
Authors
Year
- 2018
Description
- In February 2017, Huawei released the white paper Building a Trusted and Managed IoT World with Inst…
IoT Security Whitepaper 2018
In February 2017, Huawei released the white paper Building a Trusted and Managed IoT World with Instituto Nacional de Ciberseguridad (INCIBE) and Red.es of Spain at the Mobile Work Congress 2017. In October 2017, Huawei proposed an innovative 3T+1M IoT security architecture to meet E2E security requirements from devices to […]
Publication
International Cyber Norms: Legal, Policy and Industry Perspectives
Authors
Year
- 2016
Description
- The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a serie…
International Cyber Norms: Legal, Policy and Industry Perspectives
The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a series of workshops organised by the NATO CCD COE during 2014-2015.1 The aim of the collection of articles is to shed light on the different approaches to ‘cyber norms’ in various research domains. The articles […]
Publication
Confidence Building Measures and International Cybersecurity
Authors
Year
- 2013
Description
- The meeting in Zurich took place at an important moment. Recent events have shown that much remains …
Confidence Building Measures and International Cybersecurity
The meeting in Zurich took place at an important moment. Recent events have shown that much remains to be done to ensure and strengthen confidence between states and society around the different uses of cyberspace. Meanwhile, mistrust between states regarding the use of cyberspace continues to rise, not least due […]