Telecom Security During a Pandemic
The COVID-19 pandemic not only highlighted the importance of electronic communication networks and services for the EU’s society and economy, but it also triggered major changes and challenges in their use in the EU and worldwide. In this paper, we…
Strategies for incident response and cyber crisis cooperation
This document was prepared for the NIS Platform WG2 members introducing the main functions of CSIRTs from incident handling to crisis coordination – a high-level summary of the basics of incident response based on ENISA’s previous work on CSIRTs and…
Cybersecurity Stocktaking in the CAM
In this document, the CAM ecosystem and insights involving stakeholder interactions, critical services and infrastructures, standards, as well as security measures are described. The insights gained from the survey, interviews, and desk research…
Reframing Cybersecurity Awareness Raising: Exploring the human factor in cybersecurity communication
The Cybersecurity Awareness Raising Conference, powered by ENISA C-level cybersecurity awereness guide, brought together professionals of both the public and private sector.
Good Practice Guide on Cooperative Models for Effective PPPs
This Good Practice Guide on Cooperative Models for Effective Public Private Partnerships (PPPs) classifies PPPs for security and resilience and reveals the main five components addressing Why, Who, How, What and When questions associated with…
ENISA conference - Threathunt 2030
2024 edition of the Threathunt 2030 conference, the ENISA flagship conference focused on the emerging cybersecurity threats of the future and on how the Union and Member States can best foresee, identify, prevent and respond to future challenges…
The 2024 ERA-ENISA Conference on Railway Cybersecurity seeks to strengthen sector preparedness and resilience against current threats
Amidst emerging technology advancements and evolving security challenges in the sector, the fourth edition of the conference aims to explore the railway cybersecurity threats landscape.
7th E.DSO/EE-ISAC/ENCS/ENISA Cybersecurity Forum
From theory to practice: How do we get it right? How do we get it right in time?
Indispensable baseline security requirements for the procurement of secure ICT products and services
This short paper can be of use to suppliers and procurement officers when planning, offering and purchasing ICT products, systems and services. It is meant as a practical, technologically neutral document with clear, simple and sector-agnostic…
Pagination