Search results

95 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
Presentations - Cybersecurity Standardisation
Located in Events / Conference: Cybersecurity standardization - where are we today after one year?
File PDF document 1 Gonzalez.pdf
Located in Events / Conference: Cybersecurity standardization - where are we today after one year? / Presentations - Cybersecurity Standardisation
File PDF document 3a Lacroix.pdf
Located in Events / Conference: Cybersecurity standardization - where are we today after one year? / Presentations - Cybersecurity Standardisation
File PDF document 3a Santini.pdf
Located in Events / Conference: Cybersecurity standardization - where are we today after one year? / Presentations - Cybersecurity Standardisation
File PDF document 3b Chapman.pdf
Located in Events / Conference: Cybersecurity standardization - where are we today after one year? / Presentations - Cybersecurity Standardisation
File PDF document 3b Fallman.pdf
Located in Events / Conference: Cybersecurity standardization - where are we today after one year? / Presentations - Cybersecurity Standardisation
Report/Study Improving recognition of ICT security standards
This report is a continuation and an extension of previously carried out ENISA work on approaches to the NIS Directive by Member States, which have provided recommendations on standardisation and have outlined the use and management of CSIRTs.
Located in Publications
File Grall
Located in Events / Cybersecurity and Data Protection Standards in support of European policy / Presentations
File Rannenberg
Located in Events / Cybersecurity and Data Protection Standards in support of European policy / Presentations
File Brookson
Located in Events / Cybersecurity and Data Protection Standards in support of European policy / Presentations

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information