Tool
Good Practice Guide on National Cyber Security Strategies
Authors
Year
- 2016
Description
- To meet current and emerging cyber security threats, EU Member States need to constantly develop and…
Good Practice Guide on National Cyber Security Strategies
To meet current and emerging cyber security threats, EU Member States need to constantly develop and adapt their cyber security strategies. National cyber security strategies (NCSS) are the main documents of nation states to set strategic principles, guidelines, and objectives and in some cases specific measures in order to mitigate […]
Tool
Cybersecurity Strategies Evaluation Tool
Authors
Year
- 2018
Description
- ENISA created this tool to help Member States evaluate their strategic priorities and objectives rel…
Cybersecurity Strategies Evaluation Tool
ENISA created this tool to help Member States evaluate their strategic priorities and objectives related to National Cyber Security Strategies. Select your country’s cyber security priorities and answer a few simple questions (with a YES or a NO) to reveive ideas and advice for improvement. Source – ENISA website
Tool
Guide to Developing a National Cybersecurity Strategy (1st Edition 2018)
Authors
Year
- 2018
Description
- The purpose of this document is to guide national leaders and policy-makers in the development of a …
Guide to Developing a National Cybersecurity Strategy (1st Edition 2018)
The purpose of this document is to guide national leaders and policy-makers in the development of a National Cybersecurity Strategy, and in thinking strategically about cybersecurity, cyber-preparedness and resilience. This Guide aims to provide a useful, flexible and user-friendly framework to set the context of a country’s socio-economic vision and […]
Tool
Portal of Cybersecurity Capacity Maturity Model (CMM) Review Reports
Authors
Year
- 2024
Description
- The CMM has been deployed more than 120 times in over 85 nations around the world, including two reg…
Portal of Cybersecurity Capacity Maturity Model (CMM) Review Reports
The CMM has been deployed more than 120 times in over 85 nations around the world, including two regional studies in Latin America and the Caribbean through collaboration with the OAS. Each of the reviews has been coordinated and facilitated either by the GCSCC and one or more of its […]
Tool
Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition
Authors
Year
- 2021
Description
- The Cybersecurity Capacity Maturity Model for Nations (CMM) facilitates the assessment of a countryâ…
Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition
The Cybersecurity Capacity Maturity Model for Nations (CMM) facilitates the assessment of a country’s cybersecurity capacity maturity. Developed by the Global Cyber Security Capacity Centre (GCSCC) of University of Oxford in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil […]
Tool
International Cyber Law in Practice: Interactive Toolkit
Authors
Year
- 2024
Description
- The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work w…
International Cyber Law in Practice: Interactive Toolkit
The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations. The Toolkit may be explored and utilized in a number of different ways. At its core, it presently consists of 32 hypothetical scenarios. Each […]
Tool
Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS
Authors
Year
- 2016
Description
- Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’…
Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS
Let’s start with the basics. We all want a nice, safe, stable world.. …where bad guys don’t do bad things, right? Norms can help us move in that direction. Internationally, norms are one of three tools available to limit destructive behavior by bad actors.The other two are coercion and treatiesor […]
Tool
Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT
Authors
Year
- 2016
Description
- Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from …
Decision No. 5/16 OSCE Efforts Related to Reducing the Risks of Conflict Stemming from the Use of ICT
Reaffirming that efforts by OSCE participating States to reduce the risks of conflict stemming from the use of information and communication technologies will be consistent with: international law, including, inter alia, the UN Charter and the International Covenant on Civil and Political Rights; the Helsinki Final Act; and their responsibilities […]
Tool
Norms Package Singapore
Authors
Year
- 2018
Description
- From its very beginnings, cyberspace has been designed in a decentralized manner, and therefore rela…
Norms Package Singapore
From its very beginnings, cyberspace has been designed in a decentralized manner, and therefore relatively loosely governed. This helped encourage the fledging technology and was likely critical for its rapid growth. Cyberspace has created unprecedented social and economic benefits, but it also created real risks and challenges for international peace […]
Tool
UN GGE 2015 Report
Authors
Year
- 2015
Description
- Information and communications technologies (ICTs) provide immense opportunities and continue to gro…
UN GGE 2015 Report
Information and communications technologies (ICTs) provide immense opportunities and continue to grow in importance for the international community. However, there are disturbing trends that create risks to international peace and security. Effective cooperation among States is essential to reduce those risks. The 2015 Group of Governmental Experts on Developments in […]
Tool
Online Cyberdiplomacy Training Course
Authors
Year
- 2019
Description
- An online training course to encourage greater understanding of the use of ICTs and its implications…