No products in the cart.
Economic and Social Prosperity
GPD. ‘Involving Stakeholders in National Cybersecurity Strategies: A Guide
for Policymakers’, 2020. https://www.gp-digital.org/publication/involving
stakeholders-in-national-cybersecurity-strategies-a-guide-for-policymakers/.
GPD. ‘Toolkit for Inclusive and Value-Based Cybersecurity Policymaking’.
https://www.gp-digital.org/publication/toolkit-for-inclusive-and-value-based
cybersecurity-policymaking/.
OECD. ‘Recommendation of the Council on Digital Security of Critical
Activities’, 2019. https://ccdcoe.org/uploads/2020/01/OECD-191211-The
Recommendation-of-the-Council-on-Digital-Security-of-Critical-Activities.pdf.
OECD. ‘Recommendation of the Council on Digital Security Risk Management
for Economic and Social Prosperity, 2-A, Companion Document’, 2015.
Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, 2015.
https://www.potomacinstitute.org/images/CRIndex2.0.pdf.
Fundamental human rights
Council of Europe. ‘Second Additional Protocol to the Convention on
Cybercrime on Enhanced Cooperation and Disclosure of Electronic Evidence -
Draft as Approved by the Cybercrime Convention Committee’, 2021.
Council of Europe. ‘Strategic Priorities for Cooperation on Cybercrime and
Electronic Evidence in GLACY Countries’, sections 1, 2, 6, (2016).
Council of Europe. ‘Strategic Priorities for the Cooperation against Cybercrime
in the Eastern Partnership Region’, sections 1,2,7, (2013).
CTO. ‘Commonwealth Approach for Developing National Cyber Security
Strategies’, sections 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.18, 4.4.19, 4.4.20,
(2015).
ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing
and Implementing National Cyber Security Strategies’, sections 3.15, 3.184.9,
4.12, (2016).
Europe, Council. ‘Budapest Convention on Cybercrime and Its Additional
Protocol on Xenophobia and Racism (2001)’, 2004.
ITU. ‘Guidelines for Policy-Makers on Child Online Protection’, sections 3.3, 3.4,
(2020). https://www.itu-cop-guidelines.com/policymakers.
Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, section 3,
2015. https://www.potomacinstitute.org/images/CRIndex2.0.pdf.
Inclusiveness60
Guide to Developing a National Cybersecurity Strategy 2nd Edition
6 – REFERENCE MATERIALS
UN. ‘Sustainable Development Goals, Article 16.3 UNCTAD, Global Cyberlaw
Tracker’, 2015.
UNHR. ‘International Covenant on Civil and Political Rights, Article 19’, 1976.
WEF. ‘Cybercrime Prevention Principles for Internet Service Providers’, 2020.
https://www.weforum.org/reports/cybercrime-prevention-principles-for
internet-service-providers.
WEF. ‘Partnership against Cybercrime’, 2020.
https://www.weforum.org/reports/partnership-against-cybercrime.
WEF. ‘Recommendations for Public-Private Partnership against Cybercrime’,
2016. http://www3.weforum.org/docs/WEF_Cybercrime_Principles.pdf.
World Bank. ‘Combatting Cybercrime: Tools and Capacity Building for
Emerging Economies’.
Risk management and resilience
Carnegie Mellon. ‘Handbook for Computer Security Incident Response Teams
(CSIRTs)’, 2003.
CCDCOE. ‘National Cyber Security Framework Manual’, sections: 3.2, 4.2.2,
(2012). https://ccdcoe.org/library/publications/national-cyber-security
framework-manual/.
CCDCOE. ‘National Cyber Security Strategy Guidelines’, sections 3.5 (2013).
https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.
CCI. ‘Checklist’, 2013.
Strategies’, sections 4.4.3, 4.4.20, 4.4.21, 4.4.22, 4.4.27, 4.4.31, (2015).
ENISA. ‘CERT Operational Gaps and Overlaps’, 2011.
ENISA. ‘Good Practice Guide for Incident Management’, 2011.
and Implementing National Cyber Security Strategies’, sections 3.6, 3.7, 3.10,
3.14, 4.1, 4.5, 4.8, (2016).
ENISA. ‘Strategies for Incident Response and Cyber Crisis Cooperation’, 2016.
FIRST. ‘FIRST CSIRT Services Framework Version 2.1’, 2019.
https://www.first.org/standards/frameworks/csirts/FIRST_CSIRT_Services_
Framework_v2.1.0.pdf.
FIRST. ‘FIRST PSIRT Services Framework Version 1.1’, 2020.
https://www.first.org/standards/frameworks/psirts/FIRST_PSIRT_Services_
Framework_v1.1.pdf.61
Global Cyber Security Capacity Center. ‘Cybersecurity Capacity Maturity
Model for Nations (CMM)’, Dimension 1: 1.2; Dimension 5: 5.6, University
Oxford, 2021.
ITU. ‘CIRT Framework’, 2021.
ITU. ‘CyberDrill Framework’, 2021.
Microsoft. ‘Developing a National Strategy for Cybersecurity, Section: Building
Incident Response Capabilities’, 2013.
Microsoft. ‘Information Sharing Framework for Cybersecurity’, 2015.
Microsoft. ‘Risk Management for Cybersecurity: Security Baselines’, 2017.
OAS. ‘Best Practice for Establishing a National CSIRT’, p. 35, 2016.
OAS. ‘Comprehensive Inter-American Cybersecurity Strategy: A
Multidimensional and Multidisciplinary Approach to Creating a Culture of
Cybersecurity’, pp.3-4, 2004.
for Economic and Social Prosperity’, section 2-B, 2015.
Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, section 2,4,
(2015). https://www.potomacinstitute.org/images/CRIndex2.0.pdf.
TNO. ‘Getting Started with a National CSIRT Guide’, 2021.
https://cybilportal.org/tools/getting-started-with-a-national-csirt-guide/.
UNU. ‘Report: Cyber Resilience in Asia Pacific – A Review of National
Cybersecurity Strategies’, 2020. https://collections.unu.edu/view/UNU:7760.
WEF and Carnegie. ‘International Strategy to Better Protect the Financial
System Against Cyber Threats’, 2020. https://carnegieendowment.
org/2020/11/18/international-strategy-to-better-protect-financial-system
against-cyber-threats-pub-83105.
WEF. ‘Cyber Resilience in the Electricity Ecosystem: Securing the Value
Chain’, 2020. https://www.weforum.org/whitepapers/cyber-resilience-in-the
electricity-ecosystem-securing-the-value-chain.
WEF. ‘Cyber Resilience: Playbook for Public- Private Collaboration’, 2018.
https://www.weforum.org/reports/cyber-resilience-playbook-for-public
private-collaboration.
WEF. ‘Pathways Towards a Cyber Resilient Aviation Industry’, 2021.
https://www.weforum.org/reports/pathways-towards-a-cyber-resilient
aviation-industry.62
Appropriate set of policy instruments
CCDCOE. ‘National Cyber Security Strategy Framework Manual’, section
5, 2012. https://ccdcoe.org/library/publications/national-cyber-security
CCDCOE. ‘National Cyber Security Strategy Guidelines’, section 3.2, 2013.
Model for Nations (CMM)’. Dimension 4: 4.1, 4.3, 4.4, University Oxford, 2021.
Clear leadership, roles, and resource allocation
CCDCOE. ‘National Cyber Security Framework Manual’, sections 1.4.2,
2.1.1 2.1.3, 2.2, 2.3, 2.4, 3.1, 3.5, 4, 5.3.1, (2012). https://ccdcoe.org/library/
publications/national-cyber-security-framework-manual/.
CCDCOE. ‘National Cyber Security Strategy Guidelines’, sections 1.1, 3.3, 3.8,
(2013). https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.
Strategies’, sections 4.4.1, 4.4.4, 4.4.5, 4.4.8, 4.4.9, 4.4.20, 4.4.21, 4.4.34,
4.5, (2015).
ENISA. ‘An Evaluation Framework for National Cyber Security Strategies’,
sections 2, 2.2.1, 3.1.1, 3.1.2, 3.1.3, (2016).
and Implementing National Cyber Security Strategies’, sections: 3.1, 3.2, 3.4,
3.5, 3.17, (2016).
ENISA. ‘National Cyber Security Strategies: Setting the Course for National
Efforts to Strengthen Security in Cyberspace’, sections 4, 6 (2016).
Global Cyber Security Capacity Centre. ‘Cybersecurity Capacity Maturity
Model for Nations (CMM)’, Dimension 1: 1.1, 1.2, University of Oxford (2021).
(https://gcscc.ox.ac.uk/cmm-2021-edition)63
Microsoft. ‘Building an Effective National Cybersecurity Agency’, 2018.
Microsoft. ‘Developing a National Cybersecurity Strategy, Sections: A
Principled Approach to Cybersecurity, Establishing Clear Priorities and Security
Baseline’, 2013.
Trust environment
ENISA. ‘National Cyber Security Strategies: An Implementation Guide’, 2012.
ENISA. ‘National Cyber Security Strategies: Training Tool’, 2016.
GCSCC. ‘Cybersecurity Capacity Maturity Model for Nations (CMM)’,
Dimension 1: 1.1, University of Oxford, 2021.
https://gcscc.ox.ac.uk/cmm-2021-edition.
GFCE. ‘Catalog of Project Options for the National Cybersecurity Strategy
(NCS) Cycle’, 2021. https://cybilportal.org/tools/catalog-of-project-options-for
the-national-cybersecurity-strategy-ncs-cycle/.
Economic and Social Prosperity
GPD. ‘Involving Stakeholders in National Cybersecurity Strategies: A Guide
for Policymakers’, 2020. https://www.gp-digital.org/publication/involving
stakeholders-in-national-cybersecurity-strategies-a-guide-for-policymakers/.
GPD. ‘Toolkit for Inclusive and Value-Based Cybersecurity Policymaking’.
https://www.gp-digital.org/publication/toolkit-for-inclusive-and-value-based
cybersecurity-policymaking/.
OECD. ‘Recommendation of the Council on Digital Security of Critical
Activities’, 2019. https://ccdcoe.org/uploads/2020/01/OECD-191211-The
Recommendation-of-the-Council-on-Digital-Security-of-Critical-Activities.pdf.
OECD. ‘Recommendation of the Council on Digital Security Risk Management
for Economic and Social Prosperity, 2-A, Companion Document’, 2015.
OECD. ‘Recommendation of the Council on Digital Security Risk Management
for Economic and Social Prosperity, 2-A, Companion Document’, 2015.
Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, 2015.
https://www.potomacinstitute.org/images/CRIndex2.0.pdf.
Fundamental human rights
Council of Europe. ‘Second Additional Protocol to the Convention on
Cybercrime on Enhanced Cooperation and Disclosure of Electronic Evidence -
Draft as Approved by the Cybercrime Convention Committee’, 2021.
Council of Europe. ‘Strategic Priorities for Cooperation on Cybercrime and
Electronic Evidence in GLACY Countries’, sections 1, 2, 6, (2016).
Council of Europe. ‘Strategic Priorities for the Cooperation against Cybercrime
in the Eastern Partnership Region’, sections 1,2,7, (2013).
CTO. ‘Commonwealth Approach for Developing National Cyber Security
Strategies’, sections 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.18, 4.4.19, 4.4.20,
(2015).
ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing
and Implementing National Cyber Security Strategies’, sections 3.15, 3.184.9,
4.12, (2016).
Europe, Council. ‘Budapest Convention on Cybercrime and Its Additional
Protocol on Xenophobia and Racism (2001)’, 2004.
ITU. ‘Guidelines for Policy-Makers on Child Online Protection’, sections 3.3, 3.4,
(2020). https://www.itu-cop-guidelines.com/policymakers.
Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, section 3,
2015. https://www.potomacinstitute.org/images/CRIndex2.0.pdf.
Inclusiveness60
Guide to Developing a National Cybersecurity Strategy 2nd Edition
6 – REFERENCE MATERIALS
UN. ‘Sustainable Development Goals, Article 16.3 UNCTAD, Global Cyberlaw
Tracker’, 2015.
UNHR. ‘International Covenant on Civil and Political Rights, Article 19’, 1976.
WEF. ‘Cybercrime Prevention Principles for Internet Service Providers’, 2020.
https://www.weforum.org/reports/cybercrime-prevention-principles-for
internet-service-providers.
WEF. ‘Partnership against Cybercrime’, 2020.
https://www.weforum.org/reports/partnership-against-cybercrime.
WEF. ‘Recommendations for Public-Private Partnership against Cybercrime’,
2016. http://www3.weforum.org/docs/WEF_Cybercrime_Principles.pdf.
World Bank. ‘Combatting Cybercrime: Tools and Capacity Building for
Emerging Economies’.
Risk management and resilience
Carnegie Mellon. ‘Handbook for Computer Security Incident Response Teams
(CSIRTs)’, 2003.
CCDCOE. ‘National Cyber Security Framework Manual’, sections: 3.2, 4.2.2,
(2012). https://ccdcoe.org/library/publications/national-cyber-security
framework-manual/.
CCDCOE. ‘National Cyber Security Strategy Guidelines’, sections 3.5 (2013).
https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.
CCI. ‘Checklist’, 2013.
CTO. ‘Commonwealth Approach for Developing National Cyber Security
Strategies’, sections 4.4.3, 4.4.20, 4.4.21, 4.4.22, 4.4.27, 4.4.31, (2015).
ENISA. ‘CERT Operational Gaps and Overlaps’, 2011.
ENISA. ‘Good Practice Guide for Incident Management’, 2011.
ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing
and Implementing National Cyber Security Strategies’, sections 3.6, 3.7, 3.10,
3.14, 4.1, 4.5, 4.8, (2016).
ENISA. ‘Strategies for Incident Response and Cyber Crisis Cooperation’, 2016.
FIRST. ‘FIRST CSIRT Services Framework Version 2.1’, 2019.
https://www.first.org/standards/frameworks/csirts/FIRST_CSIRT_Services_
Framework_v2.1.0.pdf.
FIRST. ‘FIRST PSIRT Services Framework Version 1.1’, 2020.
https://www.first.org/standards/frameworks/psirts/FIRST_PSIRT_Services_
Framework_v1.1.pdf.61
Guide to Developing a National Cybersecurity Strategy 2nd Edition
6 – REFERENCE MATERIALS
Global Cyber Security Capacity Center. ‘Cybersecurity Capacity Maturity
Model for Nations (CMM)’, Dimension 1: 1.2; Dimension 5: 5.6, University
Oxford, 2021.
ITU. ‘CIRT Framework’, 2021.
ITU. ‘CyberDrill Framework’, 2021.
Microsoft. ‘Developing a National Strategy for Cybersecurity, Section: Building
Incident Response Capabilities’, 2013.
Microsoft. ‘Information Sharing Framework for Cybersecurity’, 2015.
Microsoft. ‘Risk Management for Cybersecurity: Security Baselines’, 2017.
OAS. ‘Best Practice for Establishing a National CSIRT’, p. 35, 2016.
OAS. ‘Comprehensive Inter-American Cybersecurity Strategy: A
Multidimensional and Multidisciplinary Approach to Creating a Culture of
Cybersecurity’, pp.3-4, 2004.
OECD. ‘Recommendation of the Council on Digital Security Risk Management
for Economic and Social Prosperity’, section 2-B, 2015.
Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, section 2,4,
(2015). https://www.potomacinstitute.org/images/CRIndex2.0.pdf.
TNO. ‘Getting Started with a National CSIRT Guide’, 2021.
https://cybilportal.org/tools/getting-started-with-a-national-csirt-guide/.
UNU. ‘Report: Cyber Resilience in Asia Pacific – A Review of National
Cybersecurity Strategies’, 2020. https://collections.unu.edu/view/UNU:7760.
WEF and Carnegie. ‘International Strategy to Better Protect the Financial
System Against Cyber Threats’, 2020. https://carnegieendowment.
org/2020/11/18/international-strategy-to-better-protect-financial-system
against-cyber-threats-pub-83105.
WEF. ‘Cyber Resilience in the Electricity Ecosystem: Securing the Value
Chain’, 2020. https://www.weforum.org/whitepapers/cyber-resilience-in-the
electricity-ecosystem-securing-the-value-chain.
WEF. ‘Cyber Resilience: Playbook for Public- Private Collaboration’, 2018.
https://www.weforum.org/reports/cyber-resilience-playbook-for-public
private-collaboration.
WEF. ‘Pathways Towards a Cyber Resilient Aviation Industry’, 2021.
https://www.weforum.org/reports/pathways-towards-a-cyber-resilient
aviation-industry.62
Guide to Developing a National Cybersecurity Strategy 2nd Edition
6 – REFERENCE MATERIALS
Appropriate set of policy instruments
CCDCOE. ‘National Cyber Security Strategy Framework Manual’, section
5, 2012. https://ccdcoe.org/library/publications/national-cyber-security
framework-manual/.
CCDCOE. ‘National Cyber Security Strategy Guidelines’, section 3.2, 2013.
https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.
CCI. ‘Checklist’, 2013.
CTO. ‘Commonwealth Approach for Developing National Cyber Security
Strategies’, sections 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.18, 4.4.19, 4.4.20,
(2015).
ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing
and Implementing National Cyber Security Strategies’, sections 3.15, 3.184.9,
4.12, (2016).
Europe, Council. ‘Budapest Convention on Cybercrime and Its Additional
Protocol on Xenophobia and Racism (2001)’, 2004.
Global Cyber Security Capacity Center. ‘Cybersecurity Capacity Maturity
Model for Nations (CMM)’. Dimension 4: 4.1, 4.3, 4.4, University Oxford, 2021.
Clear leadership, roles, and resource allocation
CCDCOE. ‘National Cyber Security Framework Manual’, sections 1.4.2,
2.1.1 2.1.3, 2.2, 2.3, 2.4, 3.1, 3.5, 4, 5.3.1, (2012). https://ccdcoe.org/library/
publications/national-cyber-security-framework-manual/.
CCDCOE. ‘National Cyber Security Strategy Guidelines’, sections 1.1, 3.3, 3.8,
(2013). https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.
CTO. ‘Commonwealth Approach for Developing National Cyber Security
Strategies’, sections 4.4.1, 4.4.4, 4.4.5, 4.4.8, 4.4.9, 4.4.20, 4.4.21, 4.4.34,
4.5, (2015).
ENISA. ‘An Evaluation Framework for National Cyber Security Strategies’,
sections 2, 2.2.1, 3.1.1, 3.1.2, 3.1.3, (2016).
ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing
and Implementing National Cyber Security Strategies’, sections: 3.1, 3.2, 3.4,
3.5, 3.17, (2016).
ENISA. ‘National Cyber Security Strategies: Setting the Course for National
Efforts to Strengthen Security in Cyberspace’, sections 4, 6 (2016).
Global Cyber Security Capacity Centre. ‘Cybersecurity Capacity Maturity
Model for Nations (CMM)’, Dimension 1: 1.1, 1.2, University of Oxford (2021).
(https://gcscc.ox.ac.uk/cmm-2021-edition)63
Guide to Developing a National Cybersecurity Strategy 2nd Edition
6 – REFERENCE MATERIALS
GPD. ‘Toolkit for Inclusive and Value-Based Cybersecurity Policymaking’.
https://www.gp-digital.org/publication/toolkit-for-inclusive-and-value-based
cybersecurity-policymaking/.
Microsoft. ‘Building an Effective National Cybersecurity Agency’, 2018.
Microsoft. ‘Developing a National Cybersecurity Strategy, Sections: A
Principled Approach to Cybersecurity, Establishing Clear Priorities and Security
Baseline’, 2013.
Trust environment
ENISA. ‘National Cyber Security Strategies: An Implementation Guide’, 2012.
ENISA. ‘National Cyber Security Strategies: Training Tool’, 2016.
GCSCC. ‘Cybersecurity Capacity Maturity Model for Nations (CMM)’,
Dimension 1: 1.1, University of Oxford, 2021.
https://gcscc.ox.ac.uk/cmm-2021-edition.
GFCE. ‘Catalog of Project Options for the National Cybersecurity Strategy
(NCS) Cycle’, 2021. https://cybilportal.org/tools/catalog-of-project-options-for
the-national-cybersecurity-strategy-ncs-cycle/.
Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, 2015.
https://www.potomacinstitute.org/images/CRIndex2.0.pdf.