Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 511-525 of 538 results

   
   
Publication

Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary

Authors

Year

  • 2017

Description

  • This publication contains a commentary on the voluntary, non-binding norms of responsible State beha…

 

Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary

This publication contains a commentary on the voluntary, non-binding norms of responsible State behavior from the 2015 report of the United Nations Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security. In an open call for comments, scholars, experts […]

Publication

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

Authors

Year

  • 2017

Description

  • The most comprehensive guide for policy advisors and legal experts on how existing International Law…

 

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

The most comprehensive guide for policy advisors and legal experts on how existing International Law applies to cyber operations. The Tallinn Manual process is continuing with a legal, technical, strategic and operational assessment of cyber scenarios, with the aim of publishing a practical reference source for Cyber Commands. Source – […]

Publication

Cybersecurity: Are We Ready in Latin America and the Caribbean?

Authors

Year

  • 2016

Description

  • The manner in which nation states and regions address cybersecurity capacity is essential for effect…

 

Cybersecurity: Are We Ready in Latin America and the Caribbean?

The manner in which nation states and regions address cybersecurity capacity is essential for effective, efficient, and sustainable cybersecurity. The 2016 Cybersecurity Report is the result of the collaboration between the Inter-American Development Bank (IDB), the Organization of American States (OAS), and the Global Cyber Security Capacity Centre (GCSCC) at […]

Publication

Cyber Maturity in the Asia-Pacific Region (2017)

Authors

Year

  • 2017

Description

  • This report assesses the national approach of Asia–Pacific countries to the challenges and opportu…

 

Cyber Maturity in the Asia-Pacific Region (2017)

This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues. The 2017 report is the fourth annual […]

Publication

An Evaluation Framework for National Cyber Security Strategies

Authors

Year

  • 2014

Description

  • An increasing number of countries in Europe have a National Cyber Security Strategy(NCSS) as a key p…

 

An Evaluation Framework for National Cyber Security Strategies

An increasing number of countries in Europe have a National Cyber Security Strategy(NCSS) as a key policy feature, helping them to tackle risks which have the potential to undermine the achievement of economic and social benefits from cyberspace. Eighteen European Union Member States have published a NCSS and some of […]

Publication

ENISA Threat Landscape Report 2018

Authors

Year

  • 2018

Description

  • 2018 was a year that brought significant changes in the cyberthreat landscape. Those changes origina…

 

ENISA Threat Landscape Report 2018

2018 was a year that brought significant changes in the cyberthreat landscape. Those changes originated in discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors. Monetization motives have contributed to the appearance of crypto-miners in the top 15 threats. State-sponsored activities […]

Tool

NIST Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy

Authors

Year

  • 2017

Description

  • This publication describes the Risk Management Framework (RMF) and provides guidelines for applying …

 

NIST Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy

This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; […]

Tool

NIST Framework for Improving Critical Infrastructure Cybersecurity V1.1

Authors

Year

  • 2018

Description

  • The NIST Cybersecurity Framework provides a policy framework of computer security guidance for how p…

 

NIST Framework for Improving Critical Infrastructure Cybersecurity V1.1

The NIST Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks. The framework has been translated to many languages and is used by the governments of […]

Tool

Multistakeholder Approaches to National Cybersecurity Development

Authors

Year

  • 2018

Description

  • For some time, governments and non-governmental actors alike have been calling for greater stakehold…

 

Multistakeholder Approaches to National Cybersecurity Development

For some time, governments and non-governmental actors alike have been calling for greater stakeholder involvement in cybersecurity policy. Despite this, multistakeholder approaches to national cybersecurity strategy (NCSS) development remain comparatively rare. In part, this is as a result of a critical gap in the cyber capacity building landscape, which currently […]

Tool

National Cyber Security Strategies: Practical Guide on Development and Execution

Authors

Year

  • 2012

Description

  • his report introduces a set of concrete actions, which if implemented will lead to a coherent and ho…

 

National Cyber Security Strategies: Practical Guide on Development and Execution

his report introduces a set of concrete actions, which if implemented will lead to a coherent and holistic national cyber-security strategy. It also proposes a national cyber-security strategy lifecycle, with a special emphasis on the development and execution phase. For each component of the strategy a list of possible and […]

Tool

Recommendations of the Council on Digital Government Strategies

Authors

Year

  • 2014

Description

  • This Recommendation aims to support the development and implementation of digital government strateg…

 

Recommendations of the Council on Digital Government Strategies

This Recommendation aims to support the development and implementation of digital government strategies that bring governments closer to citizens and businesses. It recognises that today’s technology is not only a strategic driver for improving public sector efficiency, but can also support effectiveness of policies and create more open, transparent, innovative, […]

Tool

Recommendation on Digital Security Risk Management for Economic and Social Prosperity

Authors

Year

  • 2015

Description

  • This OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity and …

 

Recommendation on Digital Security Risk Management for Economic and Social Prosperity

This OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity and its Companion Document provide guidance for a new generation of national strategies on the management of digital security risk aimed to optimise the economic and social benefits expected from digital openness.

Tool

Commonwealth Approach for Developing National Cyber Security Strategies

Authors

Year

  • 2015

Description

  • The world is witnessing the emergence of contrasting views and approaches  on how to govern the Cyb…

 

Commonwealth Approach for Developing National Cyber Security Strategies

The world is witnessing the emergence of contrasting views and approaches  on how to govern the Cyberspace. Mindful of the unique nature of Cyberspace and of the importance of maintaining it  as a place that fosters interactions, innovation and entrepreneurship, the CTO embarked on a project to develop the Commonwealth […]

Tool

Developing a National Strategy for Cybersecurity

Authors

Year

  • 2013

Description

  • Microsoft strongly supports governments taking steps to protect their most essential information  a…

 

Developing a National Strategy for Cybersecurity

Microsoft strongly supports governments taking steps to protect their most essential information  and ICT systems—those needed to support national security, the economy, and public safety. A national cybersecurity strategy is critical for managing national-level cyber risks and developing appropriate legislation or regulation to support those efforts. As a global software […]

Tool

National Cyber Security Strategy Guidelines

Authors

Year

  • 2013

Description

  • The aim of the National Cyber Security Strategy Guidelines is to assist national policy planners in …

 

National Cyber Security Strategy Guidelines

The aim of the National Cyber Security Strategy Guidelines is to assist national policy planners in drafting, improving, implementing and evaluating their national cyber security strategies (NCSS) and other related documents, thereby achieving a higher level of protection against rapidly evolving cyber threats. The Guidelines take a comprehensive approach to […]

13

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.