Report on Annual Privacy Forum 2012
The first Annual Privacy Forum1 (APF’12) was held in Limassol, Cyprus from 10–11 October 2012.
The Forum was co-organised by the European Network and Information Security Agency (ENISA)2
and the European Commission Directorate General for…
Introduction to Return on Security Investment
As for any organization, CERTs need to measure their cost-effectiveness, to justify their budget usage and provide supportive arguments for their next budget claim. But organizations often have difficulties to accurately measure the effectiveness…
Collaborative Solutions For Network Information Security in Education
This report, ‘Collaborative Solutions For Network Information Security in Education’, is a continuation of the work undertaken in 2011 which resulted in the publication of the report ‘Network Information Security in Education: Consolidated ENISA…
Roadmap to provide more proactive and efficient CERT training
The roadmap identifies 10 proposals on how ENISA could improve CERT training and exercises in Europe. The ideas in the document are valuable, as they reflect the actual community needs and requirements and there could be mutual benefit from both…
EU Cyber Cooperation-The Digital Frontline
We all share a common interest in guaranteeing a free, safe and sound life in cyberspace. ENISA
firmly believes EU cyber cooperation is crucial to establishing a proficient and coherent approach
to Network and Information Security (NIS). This…
Involving Intermediaries in Cyber-security Awareness Raising
This document summarises the work carried out to involve intermediaries in cyber-security awareness raising by the European Commission and the European Network and Information Security Agency in cooperation with the United States Department of…
Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime
In 2010 ENISA started its support for operational collaboration between the Computer Emergency Response Teams (CERTs) in the Member States on the one hand and Law Enforcing Agencies (LEA) on the other hand. Various activities have since been…
Proactive detection of security incidents II - Honeypots
An increasing number of complex attacks demand improved early warning detection capabilities for CERTs. By having threat intelligence collected without any impact on production infrastructure, CERTs can better defend their constituencies assets.…
The right to be forgotten - between expectations and practice
The right to be forgotten is included in the proposed regulation on data protection published by the European Commission in January 2012. The regulation is still to be adopted by the European Parliament for entering into force. The different legal…
Privacy considerations of online behavioural tracking
Internet users are being increasingly tracked and profiled and their personal data are extensively used as currency in exchange for services. It is important that this new reality is better understood by all stakeholders if we are to be able to…
Pagination