Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 456-468 of 538 results

   
   
Tool

Good Practice Guide on National Cyber Security Strategies

Authors

Year

  • 2016

Description

  • To meet current and emerging cyber security threats, EU Member States need to constantly develop and…

 

Good Practice Guide on National Cyber Security Strategies

To meet current and emerging cyber security threats, EU Member States need to constantly develop and adapt their  cyber security strategies. National cyber security strategies (NCSS) are the main documents of nation states to set strategic principles, guidelines, and objectives and in some cases specific measures in order to mitigate […]

Tool

Cybersecurity Strategies Evaluation Tool

Authors

Year

  • 2018

Description

  • ENISA created this tool to help Member States evaluate their strategic priorities and objectives rel…

 

Cybersecurity Strategies Evaluation Tool

ENISA created this tool to help Member States evaluate their strategic priorities and objectives related to National Cyber Security Strategies. Select your country’s cyber security priorities and answer a few simple questions (with a YES or a NO) to reveive ideas and advice for improvement. Source – ENISA website

Tool

Guide to Developing a National Cybersecurity Strategy (1st Edition 2018)

Authors

Year

  • 2018

Description

  • The purpose of this document is to guide national leaders and policy-makers in the development of a …

 

Guide to Developing a National Cybersecurity Strategy (1st Edition 2018)

The purpose of this document is to guide national leaders and policy-makers in the development of a National Cybersecurity Strategy, and in thinking strategically about cybersecurity, cyber-preparedness and resilience. This Guide aims to provide a useful, flexible and user-friendly framework to set the context of a country’s socio-economic vision and […]

Tool

Portal of Cybersecurity Capacity Maturity Model (CMM) Review Reports

Authors

Year

  • 2024

Description

  • The CMM has been deployed more than 120 times in over 85 nations around the world, including two reg…

 

Portal of Cybersecurity Capacity Maturity Model (CMM) Review Reports

The CMM has been deployed more than 120 times in over 85 nations around the world, including two regional studies in Latin America and the Caribbean through collaboration with the OAS. Each of the reviews has been coordinated and facilitated either by the GCSCC and one or more of its […]

Tool

Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition

Authors

Year

  • 2021

Description

  • The Cybersecurity Capacity Maturity Model for Nations (CMM) facilitates the assessment of a countryâ…

 

Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition

The Cybersecurity Capacity Maturity Model for Nations (CMM) facilitates the assessment of a country’s cybersecurity capacity maturity. Developed by the Global Cyber Security Capacity Centre (GCSCC) of University of Oxford in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil […]

Tool

International Cyber Law in Practice: Interactive Toolkit

Authors

Year

  • 2024

Description

  • The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work w…

 

International Cyber Law in Practice: Interactive Toolkit

The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations. The Toolkit may be explored and utilized in a number of different ways. At its core, it presently consists of 32 hypothetical scenarios. Each […]

Tool

Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS

Authors

Year

  • 2016

Description

  • Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’…

 

Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS

Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’t do bad things, right? Norms can help us move in that direction. Internationally, norms are one of three tools available to limit destructive behavior by bad actors.The other two are coercion and treatiesor […]

Tool

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Authors

Year

  • 2016

Description

  • Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from …

 

Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT

Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from the use of information and communication technologies will be consistent with: international law, including, inter alia, the UN Charter and the International Covenant on Civil and Political Rights; the Helsinki Final Act; and their responsibilities […]

Tool

Norms Package Singapore

Authors

Year

  • 2018

Description

  • From its very beginnings, cyberspace has been designed in a decentralized manner, and therefore rela…

 

Norms Package Singapore

From its very beginnings, cyberspace has been designed in a decentralized manner, and therefore relatively loosely governed. This helped encourage the fledging technology and was likely critical for its rapid growth. Cyberspace has created unprecedented social and economic benefits, but it also created real risks and challenges for international peace […]

Tool

UN GGE 2015 Report

Authors

Year

  • 2015

Description

  • Information and communications technologies (ICTs) provide immense opportunities and continue to gro…

 

UN GGE 2015 Report

Information and communications technologies (ICTs) provide immense opportunities and continue to grow in importance for the international community. However, there are disturbing trends that create risks to international peace and security. Effective cooperation among States is essential to reduce those risks. The 2015 Group of Governmental Experts on Developments in […]

Tool

Online Cyberdiplomacy Training Course

Authors

Year

  • 2019

Description

  • An online training course to encourage greater understanding of the use of ICTs and its implications…

 

Online Cyberdiplomacy Training Course

An online training course to encourage greater understanding of the use of ICTs and its implications for international security.

Tool

Norms Implementation Toolkit

Authors

Year

  • 2018

 

Norms Implementation Toolkit

Publication

Digital society in South East Europe

Authors

Year

  • 2024

 

Digital society in South East Europe

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.