Foresight 2030 Threats
This booklet summarises upcoming challenges and provides for an assessment of the
risks. We are now ready to design the cyber secure future ahead of us.
Cyber Insurance - Models and methods and the use of AI
The main objective of this report is to introduce cyber risk and cyber insurance, provide an overview of existing research and modelling approaches, and identify gaps for upcoming research projects.
Cloud Computing Information Assurance Framework
One of the most important recommendations in the ENISA’s Cloud Computing Risk Assessment report is the Information Assurance Framework, a set of assurance criteria designed to assess the risk of adopting cloud services, compare different Cloud…
Network and Information Systems Directive 2 (NIS2)
Understanding the NIS2 Directive: Strengthening Cybersecurity Across the EU
Security Framework for Trust Service Providers
This document proposes a security framework to achieve compliance with Article 19 of the eIDAS Regulation. As illustrated below, this security framework includes specific guidelines for TSP on: 1) Risk management related to the security of the eIDAS…
Information Packages for Small and Medium Sized Enterprises (SMEs)
Information packages for 2-3 types of organisations to help them in selecting and applying a suitable method for performing and managing information security related risks.
5G Cybersecurity Standards
This report outlines the contribution of standardisation to the mitigation of technical risks, and therefore to trust and resilience, in the 5G ecosystem. This report focuses on standardisation from a technical and organisational perspective.
EFR Framework Handbook
This handbook provides the documentation of the EFR Framework which consists of a scenario-based process model developed in order to assess and manage emerging and future risks.
Security Guide for ICT Procurement
The “Security Guide for ICT Procurement” aims to be a practical tool for electronic communications service providers to better manage security risks when dealing with vendors of ICT products and outsourced services. The Guide maps security risks…
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
This study reviews threats and potential compromises related to the security of SDN/5G networks. More specifically, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by…
Pagination