• No products in the cart.

Inclusiveness

Economic and Social Prosperity

GPD. ‘Involving Stakeholders in National Cybersecurity Strategies: A Guide

for Policymakers’, 2020. https://www.gp-digital.org/publication/involving

stakeholders-in-national-cybersecurity-strategies-a-guide-for-policymakers/.

GPD. ‘Toolkit for Inclusive and Value-Based Cybersecurity Policymaking’.

https://www.gp-digital.org/publication/toolkit-for-inclusive-and-value-based

cybersecurity-policymaking/.

OECD. ‘Recommendation of the Council on Digital Security of Critical

Activities’, 2019. https://ccdcoe.org/uploads/2020/01/OECD-191211-The

Recommendation-of-the-Council-on-Digital-Security-of-Critical-Activities.pdf.

OECD. ‘Recommendation of the Council on Digital Security Risk Management

for Economic and Social Prosperity, 2-A, Companion Document’, 2015.

OECD. ‘Recommendation of the Council on Digital Security Risk Management

for Economic and Social Prosperity, 2-A, Companion Document’, 2015.

Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, 2015.

https://www.potomacinstitute.org/images/CRIndex2.0.pdf.

Fundamental human rights

Council of Europe. ‘Second Additional Protocol to the Convention on

Cybercrime on Enhanced Cooperation and Disclosure of Electronic Evidence -

Draft as Approved by the Cybercrime Convention Committee’, 2021.

Council of Europe. ‘Strategic Priorities for Cooperation on Cybercrime and

Electronic Evidence in GLACY Countries’, sections 1, 2, 6, (2016).

Council of Europe. ‘Strategic Priorities for the Cooperation against Cybercrime

in the Eastern Partnership Region’, sections 1,2,7, (2013).

CTO. ‘Commonwealth Approach for Developing National Cyber Security

Strategies’, sections 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.18, 4.4.19, 4.4.20,

(2015).

ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing

and Implementing National Cyber Security Strategies’, sections 3.15, 3.184.9,

4.12, (2016).

Europe, Council. ‘Budapest Convention on Cybercrime and Its Additional

Protocol on Xenophobia and Racism (2001)’, 2004.

ITU. ‘Guidelines for Policy-Makers on Child Online Protection’, sections 3.3, 3.4,

(2020). https://www.itu-cop-guidelines.com/policymakers.

Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, section 3,

2015. https://www.potomacinstitute.org/images/CRIndex2.0.pdf.

Inclusiveness60

Guide to Developing a National Cybersecurity Strategy 2nd Edition

6 – REFERENCE MATERIALS

UN. ‘Sustainable Development Goals, Article 16.3 UNCTAD, Global Cyberlaw

Tracker’, 2015.

UNHR. ‘International Covenant on Civil and Political Rights, Article 19’, 1976.

WEF. ‘Cybercrime Prevention Principles for Internet Service Providers’, 2020.

https://www.weforum.org/reports/cybercrime-prevention-principles-for

internet-service-providers.

WEF. ‘Partnership against Cybercrime’, 2020.

https://www.weforum.org/reports/partnership-against-cybercrime.

WEF. ‘Recommendations for Public-Private Partnership against Cybercrime’,

2016. http://www3.weforum.org/docs/WEF_Cybercrime_Principles.pdf.

World Bank. ‘Combatting Cybercrime: Tools and Capacity Building for

Emerging Economies’.

Risk management and resilience

Carnegie Mellon. ‘Handbook for Computer Security Incident Response Teams

(CSIRTs)’, 2003.

CCDCOE. ‘National Cyber Security Framework Manual’, sections: 3.2, 4.2.2,

(2012). https://ccdcoe.org/library/publications/national-cyber-security

framework-manual/.

CCDCOE. ‘National Cyber Security Strategy Guidelines’, sections 3.5 (2013).

https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.

CCI. ‘Checklist’, 2013.

CTO. ‘Commonwealth Approach for Developing National Cyber Security

Strategies’, sections 4.4.3, 4.4.20, 4.4.21, 4.4.22, 4.4.27, 4.4.31, (2015).

ENISA. ‘CERT Operational Gaps and Overlaps’, 2011.

ENISA. ‘Good Practice Guide for Incident Management’, 2011.

ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing

and Implementing National Cyber Security Strategies’, sections 3.6, 3.7, 3.10,

3.14, 4.1, 4.5, 4.8, (2016).

ENISA. ‘Strategies for Incident Response and Cyber Crisis Cooperation’, 2016.

FIRST. ‘FIRST CSIRT Services Framework Version 2.1’, 2019.

https://www.first.org/standards/frameworks/csirts/FIRST_CSIRT_Services_

Framework_v2.1.0.pdf.

FIRST. ‘FIRST PSIRT Services Framework Version 1.1’, 2020.

https://www.first.org/standards/frameworks/psirts/FIRST_PSIRT_Services_

Framework_v1.1.pdf.61

Guide to Developing a National Cybersecurity Strategy 2nd Edition

6 – REFERENCE MATERIALS

Global Cyber Security Capacity Center. ‘Cybersecurity Capacity Maturity

Model for Nations (CMM)’, Dimension 1: 1.2; Dimension 5: 5.6, University

Oxford, 2021.

ITU. ‘CIRT Framework’, 2021.

ITU. ‘CyberDrill Framework’, 2021.

Microsoft. ‘Developing a National Strategy for Cybersecurity, Section: Building

Incident Response Capabilities’, 2013.

Microsoft. ‘Information Sharing Framework for Cybersecurity’, 2015.

Microsoft. ‘Risk Management for Cybersecurity: Security Baselines’, 2017.

OAS. ‘Best Practice for Establishing a National CSIRT’, p. 35, 2016.

OAS. ‘Comprehensive Inter-American Cybersecurity Strategy: A

Multidimensional and Multidisciplinary Approach to Creating a Culture of

Cybersecurity’, pp.3-4, 2004.

OECD. ‘Recommendation of the Council on Digital Security Risk Management

for Economic and Social Prosperity’, section 2-B, 2015.

Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, section 2,4,

(2015). https://www.potomacinstitute.org/images/CRIndex2.0.pdf.

TNO. ‘Getting Started with a National CSIRT Guide’, 2021.

https://cybilportal.org/tools/getting-started-with-a-national-csirt-guide/.

UNU. ‘Report: Cyber Resilience in Asia Pacific – A Review of National

Cybersecurity Strategies’, 2020. https://collections.unu.edu/view/UNU:7760.

WEF and Carnegie. ‘International Strategy to Better Protect the Financial

System Against Cyber Threats’, 2020. https://carnegieendowment.

org/2020/11/18/international-strategy-to-better-protect-financial-system

against-cyber-threats-pub-83105.

WEF. ‘Cyber Resilience in the Electricity Ecosystem: Securing the Value

Chain’, 2020. https://www.weforum.org/whitepapers/cyber-resilience-in-the

electricity-ecosystem-securing-the-value-chain.

WEF. ‘Cyber Resilience: Playbook for Public- Private Collaboration’, 2018.

https://www.weforum.org/reports/cyber-resilience-playbook-for-public

private-collaboration.

WEF. ‘Pathways Towards a Cyber Resilient Aviation Industry’, 2021.

https://www.weforum.org/reports/pathways-towards-a-cyber-resilient

aviation-industry.62

Guide to Developing a National Cybersecurity Strategy 2nd Edition

6 – REFERENCE MATERIALS

Appropriate set of policy instruments

CCDCOE. ‘National Cyber Security Strategy Framework Manual’, section

5, 2012. https://ccdcoe.org/library/publications/national-cyber-security

framework-manual/.

CCDCOE. ‘National Cyber Security Strategy Guidelines’, section 3.2, 2013.

https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.

CCI. ‘Checklist’, 2013.

CTO. ‘Commonwealth Approach for Developing National Cyber Security

Strategies’, sections 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.18, 4.4.19, 4.4.20,

(2015).

ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing

and Implementing National Cyber Security Strategies’, sections 3.15, 3.184.9,

4.12, (2016).

Europe, Council. ‘Budapest Convention on Cybercrime and Its Additional

Protocol on Xenophobia and Racism (2001)’, 2004.

Global Cyber Security Capacity Center. ‘Cybersecurity Capacity Maturity

Model for Nations (CMM)’. Dimension 4: 4.1, 4.3, 4.4, University Oxford, 2021.

Clear leadership, roles, and resource allocation

CCDCOE. ‘National Cyber Security Framework Manual’, sections 1.4.2,

2.1.1 2.1.3, 2.2, 2.3, 2.4, 3.1, 3.5, 4, 5.3.1, (2012). https://ccdcoe.org/library/

publications/national-cyber-security-framework-manual/.

CCDCOE. ‘National Cyber Security Strategy Guidelines’, sections 1.1, 3.3, 3.8,

(2013). https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf.

CTO. ‘Commonwealth Approach for Developing National Cyber Security

Strategies’, sections 4.4.1, 4.4.4, 4.4.5, 4.4.8, 4.4.9, 4.4.20, 4.4.21, 4.4.34,

4.5, (2015).

ENISA. ‘An Evaluation Framework for National Cyber Security Strategies’,

sections 2, 2.2.1, 3.1.1, 3.1.2, 3.1.3, (2016).

ENISA. ‘National Cyber Security Strategies Good Practice Guide – Designing

and Implementing National Cyber Security Strategies’, sections: 3.1, 3.2, 3.4,

3.5, 3.17, (2016).

ENISA. ‘National Cyber Security Strategies: Setting the Course for National

Efforts to Strengthen Security in Cyberspace’, sections 4, 6 (2016).

Global Cyber Security Capacity Centre. ‘Cybersecurity Capacity Maturity

Model for Nations (CMM)’, Dimension 1: 1.1, 1.2, University of Oxford (2021).

(https://gcscc.ox.ac.uk/cmm-2021-edition)63

Guide to Developing a National Cybersecurity Strategy 2nd Edition

6 – REFERENCE MATERIALS

GPD. ‘Toolkit for Inclusive and Value-Based Cybersecurity Policymaking’.

https://www.gp-digital.org/publication/toolkit-for-inclusive-and-value-based

cybersecurity-policymaking/.

Microsoft. ‘Building an Effective National Cybersecurity Agency’, 2018.

Microsoft. ‘Developing a National Cybersecurity Strategy, Sections: A

Principled Approach to Cybersecurity, Establishing Clear Priorities and Security

Baseline’, 2013.

Trust environment

ENISA. ‘National Cyber Security Strategies: An Implementation Guide’, 2012.

ENISA. ‘National Cyber Security Strategies: Training Tool’, 2016.

GCSCC. ‘Cybersecurity Capacity Maturity Model for Nations (CMM)’,

Dimension 1: 1.1, University of Oxford, 2021.

https://gcscc.ox.ac.uk/cmm-2021-edition.

GFCE. ‘Catalog of Project Options for the National Cybersecurity Strategy

(NCS) Cycle’, 2021. https://cybilportal.org/tools/catalog-of-project-options-for

the-national-cybersecurity-strategy-ncs-cycle/.

Potomac Institute for Policy Studies. ‘Cyber Readiness Index 2.0’, 2015.

https://www.potomacinstitute.org/images/CRIndex2.0.pdf.

 
Template Design © VibeThemes. All rights reserved.