Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 46-60 of 538 results

   
   
Publication

Guidelines and Companion Guide on Securing AI Systems

Authors

Year

  • 2024

Description

  • On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Secur…

 

Guidelines and Companion Guide on Securing AI Systems

On October 15, 2024, the Cyber Security Agency of Singapore (CSA) introduced the Guidelines on Securing AI Systems and the accompanying Companion Guide to address cybersecurity risks associated with artificial intelligence (AI). These resources aim to ensure AI systems are secure by design and default, prioritizing safety, security, and responsible […]

Tool

EU Policy Centre Digital Playbook

Authors

Year

  • 2024

Description

  • In light of the increasing complexity of the EU digital and cyber legislative landscape, there is a …

 

EU Policy Centre Digital Playbook

In light of the increasing complexity of the EU digital and cyber legislative landscape, there is a compelling need to explore the new market opportunities opened by EU legislations and identify intersections and synergies among their requirements. Considering the broad scope of the EU cyber and digital legislation, the Playbook […]

Tool

The Gambia – National Cybersecurity Awareness Raising Guide (2021-2025)

Authors

Year

  • 2021

Description

  • This guide aims to increase the level of awareness by 50% on Cybersecurity and Cybercrime issues in …

 

The Gambia – National Cybersecurity Awareness Raising Guide (2021-2025)

This guide aims to increase the level of awareness by 50% on Cybersecurity and Cybercrime issues in the Gambia by 2025. The guide seeks to advise and assist entities with better understanding of awareness raising to help propagate a responsive use of Information and Communication Technologies. It serves as a […]

Publication

Navigating the Quantum Wave: A Policy Maker’s Guide for Responsible Governance of Quantum Technologies

Authors

Year

  • 2024

Description

  • This policy paper, written by Drifa Atladóttir and published by the ICT4Peace Foundation, explores …

 

Navigating the Quantum Wave: A Policy Maker’s Guide for Responsible Governance of Quantum Technologies

This policy paper, written by Drifa Atladóttir and published by the ICT4Peace Foundation, explores the opportunities and challenges presented by quantum technologies. It examines the governance frameworks needed to ensure these technologies deliver positive outcomes for society and the economy. Drawing on insights from experts in various quantum fields, an […]

Publication

CyberCAN: Cybersecurity for Cities and Nonprofits

Authors

Year

  • 2024

Description

  • A new CLTC report provides guidance to help government leaders in San Francisco and other cities mor…

 

CyberCAN: Cybersecurity for Cities and Nonprofits

A new CLTC report provides guidance to help government leaders in San Francisco and other cities more effectively support the digital security of local nonprofits. The report, “CyberCAN: Cybersecurity for Cities and Nonprofits,” was produced as part of Cybersecurity for Cities and Nonprofits (CyberCAN), an innovative research partnership between CLTC […]

Publication

Unpacking Cyber Resilience

Authors

Year

  • 2024

Description

  • In today’s fast-evolving digital landscape, cyber threats are becoming increasingly complex. Recog…

 

Unpacking Cyber Resilience

In today’s fast-evolving digital landscape, cyber threats are becoming increasingly complex. Recognising that individuals and organisations cannot prevent all malicious attacks or cyber failures, while embracing the opportunities that digital communication brings, has led to the rise of cyber resilience. This report unpacks the concept of cyber resilience, outlining the […]

Tool

Cisco AI Readiness Index: Intentions Outpacing Abilities

Authors

Year

  • 2023

Description

  • The Cisco AI Readiness Index is based on a double blind survey of 8,161 global private sector busine…

 

Cisco AI Readiness Index: Intentions Outpacing Abilities

The Cisco AI Readiness Index is based on a double blind survey of 8,161 global private sector businesses and IT leaders involved in AI integration and/or deployments across 30 markets. The research was carried out by an independent research company between September and October 2023. Each company’s scores were determined […]

Publication

Generative AI: The defenders’ advantage

Authors

Year

  • 2024

Description

  • This guide is intended for Chief Information Security Officers (CISOs) and cybersecurity experts see…

 

Generative AI: The defenders’ advantage

This guide is intended for Chief Information Security Officers (CISOs) and cybersecurity experts seeking to collaborate with organizational leaders to leverage generative AI effectively. The article provides a brief overview of the existing threat landscape faced by enterprises in Western Europe and illustrates the transformative potential of generative AI cybersecurity […]

Publication

Internet Organised Crime Threat Assessment (IOCTA) 2024

Authors

Year

  • 2024

Description

  • The Internet Organised Crime Threat Assessment (IOCTA) is Europol’s analysis of the shifting lands…

 

Internet Organised Crime Threat Assessment (IOCTA) 2024

The Internet Organised Crime Threat Assessment (IOCTA) is Europol’s analysis of the shifting landscape of cybercrime, examining key threats and trends from the past year. The 2024 report emphasizes trends in areas such as cyber-attacks, child sexual exploitation, and online and payment fraud schemes. Recent law enforcement actions have led […]

Publication

Cost of a Data Breach Report (2024)

Authors

Year

  • 2024

Description

  • IBM’s 2024 Cost of a Data Breach Report, now in its 19th edition, provides valuable insights to he…

 

Cost of a Data Breach Report (2024)

IBM’s 2024 Cost of a Data Breach Report, now in its 19th edition, provides valuable insights to help security and IT teams effectively manage risks and mitigate potential financial losses. Key findings from this 2024 research, conducted by the Ponemon Institute and analyzed by IBM, include: The methods through which […]

Publication

Towards a Resilient Cyberspace in Southeast Asia

Authors

Year

  • 2023

Description

  • Authored by Keith Detros and published by the Tech for Good Institute (TFGI), the 2023 report “…

 

Towards a Resilient Cyberspace in Southeast Asia

Authored by Keith Detros and published by the Tech for Good Institute (TFGI), the 2023 report “Towards a Resilient Cyberspace in Southeast Asia” explores strategies to fortify cyber resilience within the SEA-6 region (Malaysia, Indonesia, Philippines, Thailand, Singapore, and Vietnam). As Southeast Asia’s digital economy rapidly expands, so do associated […]

Publication

Cybersecurity Threats, Vulnerabilities and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia

Authors

Year

  • 2024

Description

  • Authored by Jaimee Stuart with contributions from Cara Antonaccio and Min Yang, and published by UN …

 

Cybersecurity Threats, Vulnerabilities and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia

Authored by Jaimee Stuart with contributions from Cara Antonaccio and Min Yang, and published by UN Women and the UN University Institute in Macau (UNU), the 2032 report “Cybersecurity Threats, Vulnerabilities, and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia“ takes a gendered, human-centered approach to […]

Publication

Cyber ASEAN Report

Authors

Year

  • 2024

Description

  • This report is divided into two interlinked sections: Foundation and Application. Setting the contex…

 

Cyber ASEAN Report

This report is divided into two interlinked sections: Foundation and Application. Setting the context for the report, Part I: Foundation tackles the “so-what” of Cyber ASEAN, specifically the need to reimagine the conduct of cyber capacity-building in Southeast Asia. The report examines the evolution of cybersecurity cooperation in ASEAN before […]

Publication

Principles for state approaches to commercial cyber intrusion capabilities

Authors

Year

  • 2024

Description

  • The rapid growth of markets in which cyber intrusion capabilities can be bought and sold as products…

 

Principles for state approaches to commercial cyber intrusion capabilities

The rapid growth of markets in which cyber intrusion capabilities can be bought and sold as products and services by states, companies and criminals raises thorny policy challenges that are not adequately addressed by existing concepts of legitimate and illegitimate use. This paper explores these challenges, and puts forward a […]

Publication

National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent

Authors

Year

  • 2023

Description

  • This strategy, published by the Office of the National Cyber Director, Executive Office of the Presi…

 

National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent

This strategy, published by the Office of the National Cyber Director, Executive Office of the President, in July 2023, is grounded in the U.S. President’s National Cybersecurity Strategy (NCS) from March 2023. It outlines a plan to strengthen the nation’s cyber workforce, connect individuals to well-paying, quality jobs, and enhance […]

478

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.