Publication
Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary
Authors
Year
- 2017
Description
- This publication contains a commentary on the voluntary, non-binding norms of responsible State beha…
Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary
This publication contains a commentary on the voluntary, non-binding norms of responsible State behavior from the 2015 report of the United Nations Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security. In an open call for comments, scholars, experts […]
Publication
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
Authors
Year
- 2017
Description
- The most comprehensive guide for policy advisors and legal experts on how existing International Law…
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
The most comprehensive guide for policy advisors and legal experts on how existing International Law applies to cyber operations. The Tallinn Manual process is continuing with a legal, technical, strategic and operational assessment of cyber scenarios, with the aim of publishing a practical reference source for Cyber Commands. Source – […]
Publication
Cybersecurity: Are We Ready in Latin America and the Caribbean?
Authors
Year
- 2016
Description
- The manner in which nation states and regions address cybersecurity capacity is essential for effect…
Cybersecurity: Are We Ready in Latin America and the Caribbean?
The manner in which nation states and regions address cybersecurity capacity is essential for effective, efficient, and sustainable cybersecurity. The 2016 Cybersecurity Report is the result of the collaboration between the Inter-American Development Bank (IDB), the Organization of American States (OAS), and the Global Cyber Security Capacity Centre (GCSCC) at […]
Publication
Cyber Maturity in the Asia-Pacific Region (2017)
Authors
Year
- 2017
Description
- This report assesses the national approach of Asia–Pacific countries to the challenges and opportu…
Cyber Maturity in the Asia-Pacific Region (2017)
This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues. The 2017 report is the fourth annual […]
Publication
An Evaluation Framework for National Cyber Security Strategies
Authors
Year
- 2014
Description
- An increasing number of countries in Europe have a National Cyber Security Strategy(NCSS) as a key p…
An Evaluation Framework for National Cyber Security Strategies
An increasing number of countries in Europe have a National Cyber Security Strategy(NCSS) as a key policy feature, helping them to tackle risks which have the potential to undermine the achievement of economic and social benefits from cyberspace. Eighteen European Union Member States have published a NCSS and some of […]
Publication
ENISA Threat Landscape Report 2018
Authors
Year
- 2018
Description
- 2018 was a year that brought significant changes in the cyberthreat landscape. Those changes origina…
ENISA Threat Landscape Report 2018
2018 was a year that brought significant changes in the cyberthreat landscape. Those changes originated in discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors. Monetization motives have contributed to the appearance of crypto-miners in the top 15 threats. State-sponsored activities […]
Tool
NIST Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
Authors
Year
- 2017
Description
- This publication describes the Risk Management Framework (RMF) and provides guidelines for applying …
NIST Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; […]
Tool
NIST Framework for Improving Critical Infrastructure Cybersecurity V1.1
Authors
Year
- 2018
Description
- The NIST Cybersecurity Framework provides a policy framework of computer security guidance for how p…
NIST Framework for Improving Critical Infrastructure Cybersecurity V1.1
The NIST Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks. The framework has been translated to many languages and is used by the governments of […]
Tool
Multistakeholder Approaches to National Cybersecurity Development
Authors
Year
- 2018
Description
- For some time, governments and non-governmental actors alike have been calling for greater stakehold…
Multistakeholder Approaches to National Cybersecurity Development
For some time, governments and non-governmental actors alike have been calling for greater stakeholder involvement in cybersecurity policy. Despite this, multistakeholder approaches to national cybersecurity strategy (NCSS) development remain comparatively rare. In part, this is as a result of a critical gap in the cyber capacity building landscape, which currently […]
Tool
National Cyber Security Strategies: Practical Guide on Development and Execution
Authors
Year
- 2012
Description
- his report introduces a set of concrete actions, which if implemented will lead to a coherent and ho…
National Cyber Security Strategies: Practical Guide on Development and Execution
his report introduces a set of concrete actions, which if implemented will lead to a coherent and holistic national cyber-security strategy. It also proposes a national cyber-security strategy lifecycle, with a special emphasis on the development and execution phase. For each component of the strategy a list of possible and […]
Tool
Recommendations of the Council on Digital Government Strategies
Authors
Year
- 2014
Description
- This Recommendation aims to support the development and implementation of digital government strateg…
Recommendations of the Council on Digital Government Strategies
This Recommendation aims to support the development and implementation of digital government strategies that bring governments closer to citizens and businesses. It recognises that today’s technology is not only a strategic driver for improving public sector efficiency, but can also support effectiveness of policies and create more open, transparent, innovative, […]
Tool
Recommendation on Digital Security Risk Management for Economic and Social Prosperity
Authors
Year
- 2015
Description
- This OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity and …
Recommendation on Digital Security Risk Management for Economic and Social Prosperity
This OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity and its Companion Document provide guidance for a new generation of national strategies on the management of digital security risk aimed to optimise the economic and social benefits expected from digital openness.
Tool
Commonwealth Approach for Developing National Cyber Security Strategies
Authors
Year
- 2015
Description
- The world is witnessing the emergence of contrasting views and approaches on how to govern the Cyb…
Commonwealth Approach for Developing National Cyber Security Strategies
The world is witnessing the emergence of contrasting views and approaches on how to govern the Cyberspace. Mindful of the unique nature of Cyberspace and of the importance of maintaining it as a place that fosters interactions, innovation and entrepreneurship, the CTO embarked on a project to develop the Commonwealth […]
Tool
Developing a National Strategy for Cybersecurity
Authors
Year
- 2013
Description
- Microsoft strongly supports governments taking steps to protect their most essential information a…
Developing a National Strategy for Cybersecurity
Microsoft strongly supports governments taking steps to protect their most essential information and ICT systems—those needed to support national security, the economy, and public safety. A national cybersecurity strategy is critical for managing national-level cyber risks and developing appropriate legislation or regulation to support those efforts. As a global software […]
Tool
National Cyber Security Strategy Guidelines
Authors
Year
- 2013
Description
- The aim of the National Cyber Security Strategy Guidelines is to assist national policy planners in …
National Cyber Security Strategy Guidelines
The aim of the National Cyber Security Strategy Guidelines is to assist national policy planners in drafting, improving, implementing and evaluating their national cyber security strategies (NCSS) and other related documents, thereby achieving a higher level of protection against rapidly evolving cyber threats. The Guidelines take a comprehensive approach to […]