- Home
- Publications
Site map
An overview of the available content on this site. Keep the pointer still over an item for a few seconds to get its description.
-
News
- Going to the market for Cybersecurity Market Analysis
- Cyber Europe tests the EU Cyber Preparedness in the Energy Sector
- Is the EU Healthcare Sector Cyber Healthy? The Conclusions of Cyber Europe 2022
- ESAs and ENISA sign a Memorandum of Understanding to strengthen cooperation and information exchange
- Volatile Geopolitics Shake the Trends of the 2022 Cybersecurity Threat Landscape
- The 2024 ERA-ENISA Conference on Railway Cybersecurity seeks to strengthen sector preparedness and resilience against current threats
- News from the Member States
- Executive Director's news
- twitter-portlet
- January 2017
- newsletter-subscription
- newsletter-portlet
- July 2017
- Cyber Europe exercise-logo 2020_03.jpg
- International Cybersecurity Challenge: Let's Cheer for Team Europe!
- Cybersecurity Investment: Spotlight on Vulnerability Management
- Scroll through EU Cybersecurity Certification
- Diagnose your SME’s Cybersecurity and Scan for Recommendations
- Cybersecurity Investments in the EU: Is the Money Enough to Meet the New Cybersecurity Standards?
- Mind the Gap in Standardisation of Cybersecurity for Artificial Intelligence
- ENISA welcomes its new Advisory Group
- Coordinated Vulnerability Disclosure: Towards a Common EU Approach
- Meet Team Europe for International Cybersecurity Challenge 2024!
- Warfare and Geopolitics are Fuelling Denial-of-Service Attacks
- Developing a Strong Cybersecurity Workforce: Introducing the European Cybersecurity Skills Framework
- Securing the Seas and the Skies
- Cybersecurity Threats Fast-Forward 2030: Fasten your Security-Belt Before the Ride!
- Minister of Foreign Affairs of Latvia, Ms Baiba Braže, and a delegation of high-level cybersecurity officials from Moldova visited ENISA headquarters in Athens
- Every Cloud Cybersecurity Market has a Silver Lining
- Trust Services & Digital Wallets: Moving to the Cloud and Remote Identity Proofing
- Unveiling the Telecom Cybersecurity Challenges
- Emerging technologies make it easier to phish
- Sustained Activity by Threat Actors
- Geopolitics Accelerates Need For Stronger Cyber Crisis Management
- International Cybersecurity Challenge: TEAM EUROPE Wins AGAIN!
- How to achieve the Interoperability of EU Risk Management Frameworks
- Securing Personal Data in the Wake of AI
- How Cybersecurity Standards Support the Evolving EU Legislative Landscape
- Another step forward towards responsible vulnerability disclosure in Europe
- Building cyber secure Railway Infrastructure
- Applications are open: ENISA Cybersecurity Support Action Programme tender procedure
- Protecting Data: Can we Engineer Data Sharing?
- Supporting Policy Developments to Achieve a High Common Level of Cybersecurity
- Trust Service Forum 2022: Deepdive into Digital Identity Wallets and Web Certificates
- EU Digital Identity Wallet: A leap towards secure and trusted electronic identification through certification
- European Cybersecurity Skills Conference: Intensifying our efforts to close the cybersecurity skills gap in the EU
- Promoting security in the digital world during the European Cybersecurity Month
-
ENISA News
- PR's in DE
- PR's in FR
- PRs in Greek
- ENISA strategies for efficient incident response and coordination towards cyber threats
- ENISA launches new enhanced website
- ECSM partners
- ECSM logo
- New cyber security information service launched today by ENISA
- ENISA’s fifth Industry Event allowed a fruitful discussion with the NIS industry community
- Towards a new role and mandate for ENISA
- ENISA and eu-LISA boost cooperation
- ENISA- EU-lisa MOU
- ENISA report: the 2017 cyber threat landscape
- Overview of ICT certification laboratories
- Call for experts for TRANSSEC - Transport Resilience and Security Expert Group
- Cross recognition of national eID schemes in the EU: one-step forward
- If your toothbrush calls you, it might not be for dental hygiene: the importance of securing the Internet of Things
- Information Security Audit and Self – Assessment Frameworks for operators of essential services and digital service providers
- Winners of ECSC 2018 attend ICT Exhibition
- More than 100 experts attend the joint NSA-ENISA Cybersecurity workshop in Bratislava
- Join the 1st transport cybersecurity conference
- Acceptance of eIDAS audits: Global or local?
- Transport cybersecurity: Raising the bar by working together
- ENISA celebrates Safer Internet Day
- Happy International Women's Day from all of us at ENISA!
- New ENISA office inaugurated in Heraklion – Crete, Greece
- EU Member States test their cybersecurity preparedness for fair and free 2019 EU elections
- External audit on ENISA's 2018 financial accounts
- ENISA Permanent Stakeholders Group meets in Athens
- Incident report 2018
- The European Union Agency for Cybersecurity - A new chapter for ENISA
- ENISA Management Board meeting concludes with a positive exchange of views
- Information Security Risk Management training organised by ENISA and ESDC
- Submit your paper! Annual Privacy Forum 2020: Call for papers
- MEP Breakfast - How to secure Europe's cyber future
- ECSM 2019 PR
- European Cyber Security Challenge 2019 kicks off next week in Bucharest
- The European Union Military Staff visits ENISA
- ENISA welcomed a delegation from Finland
- 1st Inter-EU ISACs meeting at ENISA
- Another successful edition of the European Cyber Security Challenge concluded in Romania
- ENISA says goodbye to Prof. Dr. Udo Helmbrecht after 10 years in Office
- The EU Agency for Cybersecurity welcomes its new Executive Director: Mr. Juhan Lepassaar
- ENISA welcomes Minister Pierrakakis
- NIS Cooperation group and knowledge building meetings concluded in Athens
- Trustworthy AI requires solid Cybersecurity
- 5th eHealth Security Conference: ENISA advises on cybersecurity for hospitals
- CyLEEx19: Inside a simulated cross-border cyber-attack on critical infrastructure
- Advisory Group discusses Work Programme 2021
- GDPR & deploying pseudonymisation techniques
- 29th Article 13a telecom security meeting in Belgrade
- How to implement security by design for IoT
- ENISA draws Threat Landscape of 5G Networks
- New Executive Board Member
- ENISA puts Cybersecurity in the driver's seat
- How can EU ports tackle new cyber threats?
- Incident Response in Europe, post-NIS Directive
- ENISA cybersecurity certification preparation underway
- ENISA organises Maritime Cybersecurity Workshop in Lisbon
- ENISA launches a tool which maps security measures for OES to international standards
- Knowledge-building on Cryptography for eIDAS Supervisory Bodies
- ENISA proposes Best Practices and Techniques for Pseudonymisation
- Cyber agencies assess future cooperation opportunities
- Cybersecurity certification: lifting the EU into the cloud
- Supporting the deployment of the EU Cybersecurity Certification Framework
- Call for expression of interest for an ad hoc Working Group
- 2020 CTI-EU | Bonding EU Cyber Threat Intelligence
- The state of Cybersecurity Vulnerabilities 2018-2019
- Open platform and tools to facilitate the collaboration among Computer Security Incident Response Teams
- EU Agency for Cybersecurity and Joint Research Centre discuss cooperation
- Security supervision changes in the new EU telecoms legislation
- Securing Personal Data: a risk-based approach
- Good practices under the National Cyber Security Strategies
- The EU Agency for Cybersecurity endorses the EU Toolbox for 5G Security
- Cyber Threat Intelligence Community Bonding event
- Standardisation and the EU Cybersecurity Act
- “Stronger Together” Cyber Europe 2020, get involved!
- Do you know who is who in EU cybersecurity?
- Call for Expression of Interest - eHealth Security Experts Group
- Second Staff Exchange between EU Cybersecurity Organisations
- The European Cyber Security Challenge encourages young people to pursue a cyber career
- Call for expression of interest for the Advisory Group
- Telecom Security Authorities meeting in Brussels
- Prevention is the cyberdefence for hospitals
- Building a Stronger Cybersecurity Community: 8th ENISA Industry Event
- After cloud…cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services
- Security requirements for operators of essential services and digital service providers
- Joint fight against COVID-19 related threats
- Cyber Europe 2020 postponed
- Call for Expression of Interest: Experts Group in Artificial Intelligence Cybersecurity
- Launch of our cybersecurity platform: get involved and educate yourself
- APF 2020 postponed
- Supporting the fight against cybercrime
- Tips for cybersecurity when buying and selling online
- Call for Expression of Interest – CAMSec Experts Group
- ENISA publishes a Tool for the Mapping of Dependencies to International Standards
- New Training: on orchestration of CSIRT Tools
- Earning Trust: ENISA on eID and Trust services
- Underpinning software security: the role of the EU cybersecurity certification framework
- European Cybersecurity Month: highlights of the 2019 Campaign
- Encrypted Traffic Analysis: Use Cases & Security Challenges
- Tips for selecting and using online communication tools
- Training material to enhance cooperation across CSIRTs and Law Enforcement
- What is a CSIRT and how can it help me?
- Sharing is caring: technical cooperation across CSIRTs, LE and the judiciary
- Understanding and dealing with phishing during the COVID-19 pandemic
- ENISA contributes to a Council of Europe webinar on cooperating with CSIRTs to counter cybercrime
- Dependency of Energy Operators on time sensitive services
- Cybersecurity in the healthcare sector during COVID-19 pandemic
- Top ten cyber hygiene tips for SMEs during COVID-19 pandemic
- Tips for secure user authentication
- ENISA working group on Artificial Intelligence cybersecurity kick-off
- 2nd Inter-EU ISACs Meeting
- Spotlight on incident reporting of telecom security and trust services
- EU Cybersecurity: A newly-formed stakeholders group will work on the cybersecurity certification framework
- Article 13a Expert Group convened by ENISA for its 31st meeting
- ENISA Launches Public Consultation for First Candidate Cybersecurity Certification Scheme
- ENISA Leads Cybersecurity Seminar for the Hellenic Ministry of Digital Governance
- 25th Meeting of the Cybersecurity Working Group of the European Banking Federation
- European Cybersecurity Skills Framework: call for participation in the new Ad Hoc Working Group
- Annual Report on Trust Services Security Incidents in 2019
- A billion user hours lost in EU telecoms due to security incidents in 2019
- ENISA unveils its New Strategy towards a Trusted and Cyber Secure Europe
- 1st ENISA Advisory Group Meeting: Members to Strengthen Agency’s Work Towards a Cyber Secure Europe
- Survey to Explore the Preparedness of EU SMEs for Cybersecurity Challenges
- OTT Security & Resilience: ENISA Launches a New Survey
- Report on the EU 5G Toolbox Implementation by Member States Published
- European Cybersecurity Month: How to Get Involved
- Cybersecurity in Healthcare: Online Conference Series to Address Sector’s Key Cyber Challenges
- Ninth ENISA-EC3 Workshop on CSIRTs-LE Cooperation: standing shoulder-to-shoulder to counter cybercrime
- Blue OLEx 2020: the European Union Member States launch the Cyber Crisis Liaison Organisation Network (CyCLONe)
- Artificial Intelligence: Cybersecurity Essential for Security & Trust
- European Cybersecurity Month 2020 ‘Think Before U Click’ kicks off today
- IoT Cybersecurity: Webinar Series to Tackle Security Challenges of IoT
- Highlights on the National Cybersecurity Strategies
- Cybersecurity exercise boosts preparedness of EU Agencies to respond to cyber incidents
- Measuring ‘Security and Trust’ at the Annual Trust Services Forum
- eHealth Security Conference on Covid-19 tracing mobile apps and key findings from session 1
- EU Agency for Cybersecurity launches ISAC in a BOX Toolkit
- Annual Privacy Forum 2020: Policy and Research Unite to Advance Security of Personal Data
- IoT Security: ENISA Publishes Guidelines on Securing the IoT Supply Chain
- European Rail: Report unveils challenges and stresses the need for investment in cybersecurity
- Healthcare’s Cybersecurity Incident Response Spotlighted at European Security Event
- ENISA’s 48h Hackfest puts Europe’s cybersecurity talent to the test
- Deep Dive into the Connected and Automated Mobility (CAM) Ecosystem: New Report
- European SMEs facing increased cyber threats in changing digital landscape
- ENISA Report Highlights Resilience of Telecom Sector in Facing the Pandemic
- Focus on National Cybersecurity Capabilities: New Self-Assessment Framework to Empower EU Member States
- 16th Meeting of Article 19 Expert Group: Strengthening Security for e-Trust Services
- Driving the Global Ecosystem of Incident Response Capabilities: New Studies Now Available
- New Guidelines for Telecom and 5G Security
- NIS Directive has Positive Effect, though Study Finds Gaps in Cybersecurity Investment Exist
- Updated ENISA 5G Threat Landscape Report to Enhance 5G Security
- ENISA AI Threat Landscape Report Unveils Major Cybersecurity Challenges
- Cybersecurity in the Maritime Sector: ENISA Releases New Guidelines for Navigating Cyber Risk
- ENISA welcomes the EU Cybersecurity Strategy and Agency’s proposed tasks
- Launch of New Ad-hoc Working Group on European Cybersecurity Skills Framework
- Cloud Certification Scheme: Building Trusted Cloud Services Across Europe
- ENISA and eu-LISA – Cooperation for a More Digitally Resilient Europe
- Securing Cloud Services for Health
- Training Together to Fight Cybercrime: Improving Cooperation
- Cybersecurity to the Rescue: Pseudonymisation for Personal Data Protection
- Securing EU’s Vision on 5G: Cybersecurity Certification
- Highlights of the Cybersecurity Standardisation Conference
- Solving the Cryptography Riddle: Post-quantum Computing & Crypto-assets Blockchain Puzzles
- Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving
- Cybersecurity for 5G: ENISA Releases Report on Security Controls in 3GPP
- ENISA and CERT-EU sign Agreement to start their Structured Cooperation
- EU Electronic Communications Security Authorities Discussion on Incident reports and Policy
- Achieving Harmonisation and Cyber Resilience in the Finance Sector
- Building Trust in the Digital Era: ENISA boosts the uptake of the eIDAS regulation
- Cybersecurity in Railways Conference: Key Takeaways
- Statement on Microsoft Exchange vulnerabilities
- When & How to Report Security Incidents
- European Cybersecurity Month: 265% Increase in Social Media Mentions
- Procurement Guidelines for Cybersecurity in Hospitals: New Online tool for a Customised Experience!
- Join the Ad Hoc Working Group on EU Cybersecurity Market
- 6 Key Success Factors to run Effective National Cybersecurity Competitions
- Exploring Research Directions in Cybersecurity
- How to Secure the Connected & Automated Mobility (CAM) Ecosystem
- First visit of Security Union Vice-President Margaritis Schinas to ENISA and announcement of ‘Team EU’ for the first Cyber World Cup
- Capture-The-Flag Competitions: all you ever wanted to know!
- EU Member States test rapid Cyber Crisis Management
- Crossing a bridge: the first EU cybersecurity certification scheme is availed to the Commission
- Can Digital Identity Solutions Benefit from Blockchain Technology?
- New Light Shed on Capabilities in Energy & Healthcare
- Calling on you, 5G Experts! Join us on 5G Cybersecurity Certification
- EU Telecom Security Authorities discuss the challenges of Over-the-top Communications Services Supervision
- Pandemic urges strong measures to address risks on the security of personal data
- How to Help National Authorities deal with the Challenges of Mobile Networks Security?
- EU Boost against cyberattacks: EU Agency for Cybersecurity welcomes proposal for the Joint Cyber Unit
- Phishing most common Cyber Incident faced by SMEs
- Remote Identity Proofing: How to spot the Fake from the Real?
- Telecom & Trust Services Incidents in 2020: System Failures on the Rise
- Understanding the increase in Supply Chain Security Attacks
- European Cybersecurity Month (ECSM) 2021: Get Involved and Register Your Event
- New Tool is another step towards securing the Digital Future of SMEs
- Prague hosts a meeting of the best European talents in cybersecurity
- Risky business or a leap of faith? A risk based approach to optimise cybersecurity certification
- European Parliament delegation visit to understand how to strengthen EU resilience
- Moving forward in securing Online Trust via the Digital Wallets
- European Cybersecurity Month: Test your Skills with a Quiz
- EU National Telecom Authorities analyse Security Supervision and Latest Security Threats
- Hackers-for-Hire drive the Evolution of the New ENISA Threat Landscape
- On the Watch for Incident Response Capabilities in the Health Sector
- Cybersecurity Spending: An analysis of Investment Dynamics within the EU
- Step Towards Foresight on Emerging Cybersecurity Challenges
- Higher Education in Europe: Understanding the Cybersecurity Skills Gap in the EU
- Uniting to raise awareness on Cyber Threats: European Cybersecurity Month 2021
- Germany wins the European Cybersecurity Challenge
- Risk Management: Helping the EU Railways Catch the Cybersecurity Train
- National Cybersecurity Strategies: with a vision on raising citizens’ awareness
- Beware of the Sim Swapping Fraud!
- Going full-throttle on Cybersecurity Certification and Market
- Beware of Digital ID attacks: your face can be spoofed!
- Log4j vulnerability - update from the CSIRTs Network
- Promoting Data Protection by Design: Exploring Techniques
- Why Security Concerns Drive Customers Towards Public DNS Resolvers
- European Cybersecurity Month 2019 is launched
- CSIRTs Maturity: Moving to the Next Level
- Joint Statement on Log4Shell
- Artificial Intelligence: How to make Machine Learning Cyber Secure?
- Cyber Threat Warnings: The Ins and Outs of Consumer Outreach
- Inauguration of new headquarters
- Standardisation conference explores EU cybersecurity legislation
- Taking Care of Health Data
- Cybersecurity Month campaign reduces Cyber Incidents
- Securing EU Institutions, Bodies and Agencies
- Information Sharing & Analysis Centres: Exploring the Value of Cross-Sector Exercises
- Cybersecurity Market Analysis in support of Informed Cybersecurity Business Decisions
- Coordinated Vulnerability Disclosure policies in the EU
- ENISA & ETSI Joint Workshop Tackles Challenges of European Identity Proofing
- Threathunt 2030: How to Hunt Down Emerging & Future Cyber Threats
- Cyber Europe 2022: Testing the Resilience of the European Healthcare Sector
- Hats off to Team Europe - Winners of the 1st International Cybersecurity Challenge!
- Successful conclusion to the 3 day workshop: The role of the EU’s Cyber Ecosystem in the global cyber security stability
- The Annual Privacy Forum (APF) celebrates its first 10 years, as the links between privacy protection & cybersecurity continue to grow
- Telecom Security Forum: National Authorities and Telecom Regulators Analyse Policy Implementation & Current Cyber Threats
- Incidents 2021
- How to map the Cybersecurity Threat Landscape? Follow the ENISA 6-step Methodology
- Want to join ENISA's Advisory Group? Call for Experts is now Open!
- International Cooperation: ENISA Welcomes EU Eastern Partnership Delegation for a Study Visit to its Headquarters
- Post-Quantum Cryptography: Anticipating Threats and Preparing the Future
- News
- BLUE OLEX 2023: Getting Ready for the Next Cybersecurity Crisis in the EU
- Cybersecurity Skills Conference: Strengthening human capital in the EU
- Shaping Cybersecurity Policy towards a trusted and secure Europe
- Cybersecurity Awareness Raising: Peek Into the ENISA-Do-It-Yourself Toolbox
- Blue OLEx 2022 tests the Standard Operating Procedures of the EU CyCLONe
- Dive into the Deep Sea: A View of the Subsea Cable Ecosystem
- CISA and ENISA enhance their Cooperation
- Germany wins the 2023 European Cybersecurity Challenge
- Telecom & Trust Services Incidents in 2021: Over-The-Top (OTT) Challenges Emerging
- Hurrah for Denmark, Top Winner of the 2022 European Cybersecurity Challenge
- Cyber Insurance: Fitting the Needs of Operators of Essential Services?
- Navigating through Challenges and Opportunities of Cybersecurity Standardisation
- eHealth Conference: Sector Matures in terms of Cybersecurity but not fast enough
- Ransomware: Publicly Reported Incidents are only the tip of the iceberg
- Custom-made Awareness Raising to enhance Cybersecurity Culture
- European Cybersecurity Month 2022: Ten Years of Raising Cyber Awareness Throughout Europe
- TEAM EUROPE on the Starting Blocks for the 1st International Cybersecurity Challenge!
- Exploring the Feasibility of EU Cybersecurity Certification in support of New Technologies
- Maritime Sector Sails through rough 'Cybersecurity' Seas
- Blue OLEx 2021 : Testing the Response to Large Cyber Incidents
- Checking-up on Health: Ransomware Accounts for 54% of Cybersecurity Threats
- ENISA’s Management Board elects its new Chair and Deputy
- EU cybersecurity exercise: foster cooperation, secure free and fair EU elections
- An EU Prime! EU adopts first Cybersecurity Certification Scheme
- Pairing up Cybersecurity and Data Protection Efforts: EDPS and ENISA sign Memorandum of Understanding
- Is Secure and Trusted AI Possible? The EU Leads the Way
- Skills shortage and unpatched systems soar to high-ranking 2030 cyber threats
- 7th Cybersecurity Forum: Power grids cybersecurity ascending to prominence
- New chapter begins as ENISA celebrates 20 years of strengthening cybersecurity
- ENISA Joins International Fair of Thessaloniki to Promote Cybersecurity Skills
- CSIRT - Law Enforcement Cooperation Workshop - 10 Years of Joint Efforts against Cybercrime
- Joint Statement on Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities
- EU Elections at Risk with Rise of AI-Enabled Information Manipulation
- Understanding Cyber Threats in Transport
- Share your feedback: ENISA public consultation bolsters EU5G Cybersecurity Certification
- Cybersecurity & Foreign Interference in the EU Information Ecosystem
- Safeguarding EU elections amidst cybersecurity challenges
- ENISA Supports the Cooperation among Sectorial Information Sharing & Analysis Centers (ISACs)
-
Events
- Assessing Cyber Skills on the basis of the ECSF
- 7th ehealth conference
- ENISA Telecom Security Forum
- Annual Privacy Forum 2023
- 14th EU-CyCLONe Officers meeting
- 11th CyCLONe Officers meeting
- Cybersecurity skills - Building a cybersecurity workforce
- ENISA Cybersecurity Market Analysis Conference
- ENISA Cybersecurity Market Analysis Conference
- Trust Services and eID Forum - CA Day 2023
- 2nd ERA-ENISA Conference on Cybersecurity in Railways
- Threathunt 2030
- ENISA Cybersecurity Market Analysis Conference 2023
- 19th CSIRTs Network meeting
- 2024 ENISA CTI Conference
- 10th CyCLONe Officers meeting
- CE2024: Final Planning Conference
- 20th CSIRTs Network Meeting
- ENISA Cybersecurity Market Analysis Conference
- ECSF skills conference 2023
- TSF and CA Day 2024
- Threathunt 2030
- 23rd CSIRTs Network Meeting
- EU ISACS summit 2024
- 2nd Telecom Security Forum
- Trust Services Forum - CA Day 2022
- 4th CyCLONe Officers Meeting
- 16th EU-CyCLONe Officers meeting
- 2022 ENISA Cyber security policy conference
- CyCLONe Executives meeting
- European Cybersecurity Challenge 2022
- BLUEOLEX23
- Cyber-Girls
- 7th E.DSO/EE-ISAC/ENCS/ENISA Cybersecurity Forum
- APF 2024 Data Protection Notice
- ENISA webinar - Cybersecurity skills
- 2023 ENISA AI Cybersecurity Conference
- RemoteIdentity_Workshop_Amsterdam2023
- 4th ERA ENISA conference Agenda - Final
- International Cybersecurity Challenge 2023(ICC)
- 4th ERA-ENISA Conference on Cybersecurity in Railways
- Cybersecurity Resilience and Market Conference - Data Protection Notice
- Remote Video Identification: Attacks and Foresight
- 2023 CTI- EU Conference
- Events
- 2022 CTI- EU Conference
- European Cybersecurity Challenge 2023
- 4th Telecom Security Forum
- ENISA - Incibe workshop: Future of 5G Cybersecurity
- Take a walk on the CISO side
- Cybersecurity Skills Conference presentation
- 9th ENISA National Cybersecurity Strategies Workshop
- 8th CyCLONe Officers meeting
- 8th ENISA eHealth Security Conference
- 18th CSIRTs Network meeting
- AEPD - ENISA conference on Data Spaces
- 9th ENISA eHealth Security Conference
- Events
- Annual Privacy Forum 2024
- European Cybersecurity Skills Conference 2023
- AEPD-ENISA 2023 Conference
- 24th CSIRTs Network Meeting
- EU-CyCLONe Executives meeting
- EU Cybersecurity Policy Conference
- ENISA AI Cybersecurity Conference
- 3rd ENISA Telecom & Digital Infrastructure Security Forum
- ENISA 2nd Maritime Cybersecurity Conference
- 2nd ERA conference 2022
- 3rd ERA-ENISA Conference on Cybersecurity in Railways
- ENISA Cybersecurity Certification Conference 2021
- ENISA Events
- Speaking Engagements
- NIS Events
- Future Challenges in Network and Information Security
- Past events
- ENISA Workshop on EU Threat Landscape
- EU-U.S. event on intermediaries in cybersecurity awareness raising
- ENISA/OWASP session "Global Secure Software Initiatives - Beyond Awareness"
- 2nd European Workshop on Emergency Preparedness in the Telecom Sector
- ENISA's and RAND Europe's Workshop on Incentives and Challenges for Information Sharing - Brussels 1st July 2010
- European emergency preparedness in the field of fixed and mobile telecommunications and Internet
- Workshop on Information Sharing
- Industrial Control Systems (ICS) Security Workshop
- EU-US Open Workshop on Cyber Security of ICS and Smart Grids
- ENISA's Workshop on National Cyber Security Strategies
- Security Certification of Smart Grid Components
- Smart Grids Security Workshop
- ENISA's Workshop on Resilient Internet Interconnections
- Recommendations for Harmonized ICS Testing Capability in the EU
- Resilience of Network Interconnections
- Securing European networks - 2014 workshop on Critical Information Infrastructures and Internet Infrastructure
- Certification of Cyber Security Skills of ICS SCADA Experts and Smart Grid Components
- SecureCloud 2014
- Communication network dependencies for smart grids
- ENISA Workshop on Cyber security for IoT in Smart Home Environments
- ENISA Workshop on Cyber security for Public Transport in Smart Cities
- 4th ENISA/EC3 Workshop
- Train the trainers and multipliers workshop
- 10th CERT Workshop
- Trust Services Forum 2015
- Annual Privacy Forum 2015
- Cyber Security education seminar: innovation
- Cyber security education seminar: evaluation ECSM2015
- Cyber Security Month kick- off conference
- Training #CyberSecMonth
- 2nd Informal meeting of the European Forum for Member States
- 2nd Workshop on the establishment of a European Public-Private Partnership for Resilience (EP3R).
- International Conference on Resilience
- 1st Workshop on DNSSEC deployment
- Minimum Security Measures for Smart Grids
- 7th German Anti Spam Summit
- Cyber Security Strategies, Critical Information Infrastructures Protection and ICS SCADA event
- ENISA eHealth security workshop
- Big Data Security workshop
- 7th German Anti Spam Summit
- Information Sharing Workshop
- ENISA Workshop on EU Threat Landscape
- ENISA Workshop on Cyber security for Public Transport in Smart Cities
- ENISA Workshop on Cyber security for IoT in Smart Home Environments
- Resilience of Network Interconnections
- Workshop on Resilient Internet Interconnections
- 2014 workshop on Critical Information Infrastructures and Internet Infrastructure
- Botnets
- Certification of Cyber Security Skills of ICS SCADA Experts and Smart Grid Components Certification
- ICS/SCADA Security Workshop
- Recommendations for Harmonized ICS Testing Capability in the EU
- Good Practices for an EU ICS Testing Coordination Capability
- EU-US Open Workshop
- NCSS Workshop
- Smart Grid Workshop
- Smart Grid Certification Components
- SOG-IS
- 4th ENISA/EC3 Workshop
- Train the trainers and multipliers workshop
- Workshop
- 1st International Conference (Paris, 2012)
- 2nd International Conference (Athens, 2013)
- 10th CERT ENISA Workshop
- 11th CSIRT ENISA Workshop
- EU-U.S. event on intermediaries in cybersecurity awareness raising
- Presentations
- ENISA session "Network Attacks to ICS SCADA" @ IMI 2016 – IT meets Industry
- Securing Smart Cars Workshop
- 3rd informal meeting of the CSIRTs Network
- ENISA eHealth Cyber Security workshop
- 2016 ENISA EICS SG and EUROSCSIE meeting hosted by MSB
- Mobile attacks and defense: from infrastructure to application
- Open ENISA session @ 4SICS
- BITKOM hubconfernece #hub16
- 2ImplicationsofcybersecurityforhealthcareorganizationsRamsesGallegoSymantec.pdf
- 3ConnectingeHealthsystemsinEuropeRogerLIMEC.pdf
- 5NHSDigitalTransformationFramework.pptx
- 7ENISASmartHospitalsStudy.pptx
- 7ENISAeHealth_Workshop_Cloud_Study.pptx
- 8slidesarturogfreduced.pdf
- 10medical.pdf
- 11BuildingTrustworthyApplicationsBenKokx20161123.pdf
- 12KorpelainenENISA23_11_2016.pdf
- 1IntroENISAeHealthworkshopD.LiveriENISA.pdf
- 2_eHealthCyberSecurityWorkshop_20161123_Vienna_HoheiserPfoertner.pdf
- NorwegianCodeofconductforinformationsecurityandcloudguidelineEnisa23.11.16.pdf
- first-csirts-network-meeting
- MB Ordinary meeting
- ENISA-Europol Internet of Things Conference
- CTI-EU event
- Third CSIRTs network meeting
- Validation workshop for Baseline Security Measures for IoT & first IOTsec meeting
- European Energy ISAC meeting
- ENISA training on aviation cybersecurity co-organized with EASA
- ENISA EICS SG and EUROSCSIE meeting
- Fifth CSIRTs network meeting
- 2nd ENISA training on aviation cybersecurity co-organized with EASA
- Validation workshop for Good practices for security of IoT
- iot-industry4.0
- Personal Data Security Event
- ENISA - UNIPI Workshop on Privacy Enhancing Technologies
- Privacy Policy
- 7th CSIRTs Network meeting
-
EDPS-ENISA Conference
- Data protection notice: EDPS - ENISA workshop on personal data breaches
- EDPS logo
- Giampiero NANNI (Symantec)
- Giuseppe D'ACQUISTO (Italian DPA)
- Niall CAVANAGH (Irish DPA)
- Erik VALGAEREN (Stibbe)
- Max ROZENDAAL (Dutch DPA)
- Dina KAMPOURAKI (EDPS)
- Rosa BARCELO (Squire Patton Boggs)
- Nikolaos FIKATAS (Fundamental Rights Agency)
- Patrick VAN EECKE (DLA Piper)
- EDPS-ENISA Data Breaches Conference Notes
- Artificial Intelligence – An opportunity for the EU cyber-crisis management
- ENISA workshop on Interdependencies between Operators of Essential Services (OES) and Digital Service Providers (DSPs)
- 8th CSIRTs Network meeting
- ENISA Industry Event - Vision for a stronger cybersecurity community going forward
- Validation Workshop for Smart Cars
- Validation Workshop for Smart Cars
- Trust Services Forum - CA Day 2019
- 9th CSIRTs Network meeting
- ENISA MEP Breakfast - How to secure Europe’s Cyber Future?
-
ULD-ENISA Workshop
- ULD - ENISA Workshop: Pseudonymisation and relevant security technologies
- ULD - ENISA Workshop: Data Protection Notice
- Logo
- Bud P. Bruegger (ULD - Schleswig-Holstein DPA)
- Fabian Prasser (TMF e.V.)
- Frank Wagner (Deutsche Telekom AG)
- Giuseppe D’Acquisto (Garante - Italian DPA)
- Monir Azraoui (CNIL - French DPA)
- Nils Gruschka (University of Oslo)
- Patrick von Braunmühl (Bundesdruckerei GmbH)
- Steffen Weiß (Gesellschaft für Datenschutz und Datensicherheit e.V.)
- ULD ENISA workshop notes
- Cybersecurity Certification Workshop 2019
- Annual Privacy Forum 2020
- 10th CSIRTs Network meeting
- EU TELECOM SECURITY - 30TH ARTICLE 13A GROUP MEETING
- 3rd Meeting of the AHWG on SOG-IS
- ECSM Workshop - 2020
- Trust Services Forum - CA Day 2020
- 11th CSIRTs Network meeting
- eHealth Security Conference 2020 Online Series #1
- eHealth Security Conference 2020 Online Series #2
- eHealth Security Conference 2020 Online Series #3
- Cybersecurity for Artificial Intelligence
- 8th ENISA National Cybersecurity Strategies Workshop
- 12th CSIRTs Network Meeting
- Workshop on the ENISA Report - Cybersecurity for SMEs: Challenges and Recommendations
- ENISA Cybersecurity Certification Conference (ENISA-CCC)
- Events
- Webinar - Certification of Cloud Services
- 2nd CyCLONe Officers meeting
- 13th CSIRTs Network meeting
- ECSC - Cyber-Girls
- Seminar on Blockchain-based Digital Identity Solutions
- 3rd CyCLONe Officers Meeting
- 14th CSIRTs Network meeting
- Annual Privacy Forum 2021
- European Cybersecurity Challenge 2021
- Workshop - Remote identity proofing
- Trust Servicies Forum - CA Day 2021
- 2022 CTI- EU Conference
- 10th ENISA-EC3 Workshop: CSIRTs and LE Cooperation
- 5th CyCLONe Officers meeting
- 15th EU-CyCLONe Officers meeting
- Webinar: Managing Cybersecurity Risks in Railways
- IPEN 2024 Notice
- 12th CyCLONe Officers meeting
- 21st CSIRTs Network Meeting
- 15th CSIRTs Network meeting
- About ENISA
-
Publications
- Work Programmes & General Reports
- Management Board Newsletters
- Annual Reports
- Work Programmes
- ENISA Threat Landscape 2015
- ENISA Threat Landscape 2014
- ENISA Threat Landscape mid year 2013
- Threat Landscape of Internet Infrastructure
- Threat Landscape for Smart Home and Media Convergence
- Threat Landscape and Good Practice Guide for Software Defined Networks/5G
- Big Data Threat Landscape
- Business Continuity for SMEs
- Example BCP Template
- Example Assessment Templates
- Example Asset Identification Cards
- Technology-induced challenges in Privacy & Data Protection in Europe [French Version]
- Technology-induced challenges in Privacy & Data Protection in Europe [Spanish Version]
- Technology-induced challenges in Privacy & Data Protection in Europe [German Version]
- Cloud Computing Risk Assessment
- Cloud Computing - SME Survey
- Cloud Computing Information Assurance Framework
- Behavioural Biometrics
- European Cyber Security Month 2015 - Deployment Report
- European Cyber Security Month - Deployment report
- Roadmap for European Cyber Security Month
- Involving Intermediaries in Cyber-security Awareness Raising
- Resilience Metrics and Measurements: Challenges and Recommendations
- Resilience Metrics and Measurements: Technical Report
- Impact evaluation on the implementation of Article 13a incident reporting scheme within EU
- Annual Incident Reports 2012
- Guideline on Security measures for Article 4 and Article 13a
- Technical Guideline on Threats and Assets
- Schemes for auditing security measures
- National Roaming for Resilience
- Protection of Underground Electronic Communications Infrastructure
- Security incidents indicators - measuring the impact of incidents affecting electronic communications
- Power Supply Dependencies in the Electronic Communications Sector
- Cyber Incident Reporting in the EU
- Technical guideline for Incident Reporting
- Survey and analysis of security parameters in cloud SLAs across the European public sector
- Procure Secure: A guide to monitoring of security service levels in cloud contracts
- Critical Cloud Computing-A CIIP perspective on cloud computing services
- Incident Reporting for Cloud Computing
- Security Framework for Governmental Clouds
- Good Practice Guide for securely deploying Governmental Clouds
- Cloud Security Guide for SMEs
- Secure Use of Cloud Computing in the Finance Sector
- Big Data Security
- Botnets: 10 Tough Questions
- Botnets: Measurement, Detection, Disinfection and Defence
- Policy statement
- Smartphone Secure Development Guidelines
- A Security Analysis of Next Generation Web Standards
- Communication network interdependencies in smart grids
- Resilience of the Internet Interconnection Ecosystem
- Protecting Industrial Control Systems. Recommendations for Europe and Member States
- Can we learn from SCADA security incidents?
- Window of exposure… a real problem for SCADA systems?
- Good Practices for an EU ICS Testing Coordination Capability
- Certification of Cyber Security skills of ICS/SCADA professionals
- Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors
- ENISA Smart Grid Security Recommendations
- Cyber Security Aspects in the Maritime Sector
- Mutual Aid for Resilient Infrastructure in Europe (M.A.R.I.E.) - Phase II: Recommendations Report
- Emergency Communications Stocktaking
- Methodologies for the identification of Critical Information Infrastructure assets and services
- Stocktaking, Analysis and Recommendations on the protection of CIIs
- Cyber Europe 2010 Report
- Latest Report on National and International Cyber Security Exercises
- National and International Cyber Security Exercises: Survey, Analysis & Recommendations
- Report on Second International Conference on Cyber-crisis Cooperation and Exercises
- Report on Cyber Crisis Cooperation and Management
- National Cyber Security Strategies
- Incentives and barriers of the cyber insurance market in Europe
- National Cyber Security Strategies: An Implementation Guide
- An evaluation framework for Cyber Security Strategies
- Network and Information Security in the Finance Sector
- EP3R 2013 – Task Forces on Terminology Definitions and Categorisation of Assets (TF-TDCA)
- Position Paper of the EP3R Task Forces on Incident Management and Mutual Aid Strategies (TF-MASIM)
- Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS)
- EP3R 2009-2013 Future of NIS Public Private Cooperation.
- Cyber Security and Resilience of Intelligent Public Transport. Good practices and recommendations
- Architecture model of the transport sector in Smart Cities
- Introduction to Return on Security Investment
- Impact Analysis and Roadmap
- EISAS Basic toolset
- EISAS (enhanced) report on implementation
- EISAS Large-Scale Pilot - Collaborative Awareness Raising for EU Citizens & SMEs
- EISAS - Enhanced Roadmap 2012
- EISAS Deployment feasibility study
- ENISA’s CSIRT-related capacity building activities
- Alerts-Warnings-Announcements
- CSIRT Capabilities. How to assess maturity? Guidelines for national and governmental CSIRTs
- Good practice guide for CERTs in the area of Industrial Control Systems - Computer Emergency Response Capabilities considerations for ICS
- CERT community - Recognition mechanisms and schemes
- Roadmap to provide more proactive and efficient CERT training
- Good Practice Guide on Training Methodologies
- Cooperation between CERTs and Law Enforcement Agencies in the fight against cybercrime - A first collection of practices
- Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime
- A Good Practice Collection for CERTs on the Directive on attacks against information systems
- Electronic evidence - a basic guide for First Responders
- Information sharing and common taxonomies between CSIRTs and Law Enforcement
- Good Practice Guide for Incident Management
- Proactive detection of network security incidents, report
- Proactive detection of security incidents II - Honeypots
- Good Practice Guide on Vulnerability Disclosure. From challenges to recommendations
- Trusted e-ID infrastructures and services in EU
- Analysis of standards related to Trust Service Providers - Mapping of requirements of eIDAS to existing standards
- Smartphones: Information security risks, opportunities and recommendations for users
- Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology
- Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex I
- Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex II
- Emerging and Future Risks Framework - Introductory Manual
- Security and Resilience in Governmental Clouds
- Cyber-bullying and online grooming: helping to protect against the risks
- To log or not to log? - Risks and benefits of emerging life-logging applications
- Deployment of Baseline Capabilities of n/g CERTs - Status Report 2012
- Baseline Capabilities of n/g CERTs - Updated Recommendations 2012
- Bittersweet cookies. Some security and privacy considerations
- Security Framework for Govenmental Clouds
-
ENISA position papers and opinions
- ENISA’s contribution to the Digital Single Market
- ENISA’s Position on the NIS Directive
- ENISA’s Position on the General Data Protection Regulation (GDPR)
- Cybersecurity as an Economic Enabler
- Financial Fraud in the Digital Space
- Getting down to business - ENISA in the EU Cybersecurity Certification Framework
- An evaluation framework for Cyber Security Strategies
- Life-logging risk assessment
-
Corporate Documents
- ENISA Programming Document 2020–2022
- ENISA Programming Document 2020-2022 with amendments
- ENISA Consolidated Annual Activity Report 2021
- ENISA Single Programming Document 2023-2025
- ENISA Consolidated Annual Activity Report 2022
- ENISA Single Programming Document 2024 - 2026
- ENISA Single Programming Document 2024 - 2026 - Condensed version
- ENISA Consolidated Annual Activity Report 2023
-
Cyber security info notes
- Access routers leave users vulnerable
- HowtoManageInstalledBrowserExtensions.pdf
- Disinformation operations in cyber-space
- Voter data left exposed on open internet-facing system
- State of play - Techniques used in cyber-attacks
- Supply chain attacks
- Ransom attacks against unprotected Internet exposed databases
- Phishing on the rise
- An overview of the Wi-Fi WPA2 vulnerability
- Cryptojacking - Cryptomining in the browser
- Mailsploit – E-mail spoofing and code injection vulnerabilities
- Meltdown and Spectre: Critical processor vulnerabilities
- Time for security policy review
- Is Software More Vulnerable Today?
- The Value of Personal Online Data
- How Data is Under Siege like Never Before
- Efail Vulnerability Targeting PGP Email Clients
- Security vs Performance Discussion with the Return of “Spectre” Vulnerability
- VPNFilter, a Nation State Operation
- Valid Digital Certificates Code Signing Malware
- Effective Patch Management
- ATM cash-out attacks
- Another Facebook Security Breach
- Supply Chain Attacks Back on the Agenda
- Shamoon Campaigns with Disttrack
- Cybercriminals are increasing efficiency with coordinated attacks
- DNS DDoS Attack Protections
- Challenges of security certification in emerging ICT environments
- Gaps in NIS standardisation - Recommendations for improving NIS in EU standardisation policy
- Conformity assessment of Trust Service Providers - Technical guidelines on trust services
- Security framework for Trust Service Providers - Technical guidelines on trust services
- Guidelines on Supervision of Qualified Trust Services - Technical guidelines on trust services
- Recommendations on aligning research programme with policy
- Guidelines for SMEs on the security of personal data processing
- Security guidelines on the appropriate use of qualified electronic signatures
- Security guidelines on the appropriate use of qualified electronic seals
- Security guidelines on the appropriate use of qualified electronic time stamps
- Security guidelines on the appropriate use of qualified website authentication certificates
- Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
- Towards a Digital Single Market for NIS Products and Services
- Privacy Enhancing Technologies: Evolution and State of the Art
- Indispensable baseline security requirements for the procurement of secure ICT products and services
- ENISA Maturity Evaluation Methodology for CSIRTs
- Improving Cooperation between CSIRTs and Law Enforcement: Legal and Organisational Aspects
- Online Tracking and User Protection Mechanisms
- Overview of the practices of ICT Certification Laboratories in Europe
- Economics of Vulnerability Disclosure
- ICT security certification opportunities in the healthcare sector
- Good practices on the implementation of regulatory technical standards
- Recommendations on shaping technology according to GDPR provisions - An overview on data pseudonymisation
- Study on CSIRT landscape and IR capabilities in Europe 2025
- Cooperation between CSIRTs and Law Enforcement: interaction with the Judiciary
- Cybersecurity Culture Guidelines: Behavioural Aspects of Cybersecurity
- Reinforcing trust and security in the area of electronic communications and online services
- Industry 4.0 - Cybersecurity Challenges and Recommendations
- Trust Services Security Incidents 2018 - Annual report
- Good Practices for Security of IoT - Secure Software Development Lifecycle
- ENISA threat landscape for 5G Networks
- EU Member States incident response development status report
- ENISA good practices for security of Smart Cars
- Port Cybersecurity - Good practices for cybersecurity in the maritime sector
- Pseudonymisation techniques and best practices
- Cybersecurity Culture Guidelines: 'Technical Annex: Evidence Reviews'
- Good practices in innovation on cybersecurity under the NCSS
- Security Supervision under the EECC
- ECSC 2019 Analysis Report
- State of Vulnerabilities 2018/2019 - Analysis of Events in the life of Vulnerabilities
- Recommendations for technical implementation of the eIDAS Regulation
- Cybersecurity Skills Development in the EU
- Stock taking of security requirements set by different legal frameworks on OES and DSPs
- Advancing Software Security in the EU
- Assessment of ETSI TS 119 403-3 related to eIDAS
- Standardisation in support of the Cybersecurity Certification
- EUELEx19_AAR
- Procurement Guidelines for Cybersecurity in Hospitals
- Good practices in innovation on Cybersecurity under the NCSS
- Roadmap on the cooperation between CSIRTS and LE
- eIDAS compliant eID Solutions
- European Cybersecurity Month 2019 - Deployment Report
- An overview on enhancing technical cooperation between CSIRTs and LE
- Encrypted Traffic Analysis
- Overview of standards related to eIDAS
- Power Sector Dependency on Time Service: attacks against time sensitive services
- Proactive detection – Survey results
- Proactive detection – Measures and information sources
- Proactive detection - Good practices gap analysis recommendations
- Cybersecurity Certification: Candidate EUCC Scheme
- Telecom Services Security Incidents 2019 Annual Analysis Report
- Trust Services Security Incidents 2019 Annual Analysis Report
- ENISA Threat Landscape - The year in review
- ENISA Threat Landscape 2020 - Sectoral/thematic threat analysis
- ENISA Threat Landscape - Emerging trends
- ENISA Threat Landscape 2020 - Cyber threat intelligence overview
- ENISA Threat Landscape 2020 - Spam
- ENISA Threat Landscape 2020 - Phishing
- ENISA Threat Landscape 2020 - Malware
- ENISA Threat Landscape 2020 - Ransomware
- ENISA Threat Landscape 2020 - Physical manipulation/ damage/ theft/ loss
- ENISA Threat Landscape 2020 - Web-based attacks
- ENISA Threat Landscape 2020 - Web application attacks
- ENISA Threat Landscape 2020 - Insider Threat
- ENISA Threat Landscape 2020 - Information Leakage
- ENISA Threat Landscape 2020 - Identity Theft
- ENISA Threat Landscape 2020 - Distributed denial of service
- ENISA Threat Landscape 2020 - Data Breach
- ENISA Threat Landscape 2020 - Insider threat
- ENISA Threat Landscape 2020 - Cyber espionage
- ENISA Threat Landscape 2020 - Cryptojacking
- ENISA Threat Landscape 2020 - Botnet
- ENISA Threat Landscape 2020 - Main Incidents
- ENISA Threat Landscape 2020 - List of top 15 threats
- ENISA Threat Landscape 2020 - Research topics
- Guidelines for Securing the Internet of Things
- Railway Cybersecurity
- Cybersecurity Stocktaking in the CAM
- Telecom Security During a Pandemic
- National Capabilities Assessment Framework
- How to set up CSIRT and SOC
- Sectoral CSIRT Capabilities - Energy and Air Transport
- 5G Supplement - to the Guideline on Security Measures under the EECC
- Guideline on Security Measures under the EECC
- NIS Investments Report 2020
- Artificial Intelligence Cybersecurity Challenges
- Guidelines - Cyber Risk Management for Ports
- EUCS – Cloud Services Scheme
- Cloud Security for Healthcare Services
- 2020 Report on CSIRT-LE Cooperation: study of roles and synergies among selected countries
- Data Pseudonymisation: Advanced Techniques and Use Cases
- Crypto Assets: Introduction to Digital Currencies and Distributed Ledger Technologies
- Post-Quantum Cryptography: Current state and quantum mitigation
- Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving
- Security in 5G Specifications - Controls in 3GPP
- EU Cybersecurity Initiatives in the Finance Sector
- European Cybersecurity Month 2020 - Deployment Report
- Technical Guideline on Incident Reporting under the EECC
- Towards a Common ECSC roadmap
- Situational Report on Microsoft Exchange Vulnerabilities
- Cybersecurity Certification Market Study
- PSIRT Expertise and Capabilities Development
- CTF Events
- Cybersecurity Research Directions for the EU’s Digital Strategic Autonomy
- Recommendations for the security of CAM
- Public Consultation on the draft Candidate EUCC Scheme
- Cybersecurity Certification: Candidate EUCC Scheme V1.1.1
- Cybersecurity for SMEs - Challenges and Recommendations
- Cybersecurity guide for SMEs - 12 steps to securing your business
- Assessment of EU Telecom Security Legislation
- Telecom Security Incidents 2020 - Annual Report
- Trust Services Security Incidents 2020 - Annual Report
- Threat Landscape for Supply Chain Attacks
- Methodology for Sectoral Cybersecurity Assessments
- ENISA Threat Landscape 2021
- CSIRT Capabilities in Healthcare Sector
- NIS Investments Report 2021
- Foresight Challenges
- Addressing Skills Shortage and Gap Through Higher Education
- Railway Cybersecurity - Good Practices in Cyber Risk Management
- Raising Awareness of Cybersecurity
- How to Avoid SIM-Swapping - Leaflet
- Countering SIM-Swapping
- Securing Machine Learning Algorithms
- Compendium of Risk Management Frameworks with Potential Interoperability
- Interoperable EU Risk Management Framework
- Remote Identity Proofing - Attacks & Countermeasures
- Digital Identity: Leveraging the SSI Concept to Build Trust
- NFV Security in 5G - Challenges and Best Practices
- Data Protection Engineering
- Security and Privacy for public DNS Resolvers
- Boosting your Organisation's Cyber Resilience - Joint Publication
- ENISA CSIRT Maturity Framework - Updated and improved
- Zoning and Conduits for Railways
- 2021 Report on CSIRT-Law Enforcement Cooperation
- Aspects of Cooperation between CSIRTs and LE - Handbook 2021
- Aspects of Cooperation between CSIRTs and LE - Toolset 2021
- Cyber Threats Outreach In Telecom
- 5G Cybersecurity Standards
- Risk Management Standards
- Deploying Pseudonymisation Techniques
- European Cybersecurity Month 2021 - Deployment report
- Cross-Sector Exercise Requirements
- EU Cybersecurity Market Analysis - IoT in Distribution Grid
- ENISA Cybersecurity Market Analysis Framework (ECSMAF)
- Coordinated Vulnerability Disclosure Policies in the EU
- Research and Innovation Brief - Annual Report on Cybersecurity Research and Innovation Needs and Priorities
- ENISA Threat Landscape Methodology
- ENISA Threat Landscape 2021 - Translations
- Telecom Security Incidents 2021
- ENISA Threat Landscape for Ransomware Attacks
- European Cybersecurity Skills Framework (ECSF) - User Manual
- European Cybersecurity Skills Framework Role Profiles
- Post-Quantum Cryptography - Integration study
- ENISA Threat Landscape 2022
- NIS Investments 2022
- Pseudonymisation report 2022_Translations
- Foreign Information Manipulation Interference (FIMI) and Cybersecurity - Threat Landscape
- Cyber Europe 2022: After Action Report
- Cybersecurity Education Initiatives in the EU Member States
- Engineering Personal Data Sharing
- ENISA Cybersecurity Market Analysis Framework (ECSMAF) -V2.0
- Cloud Cybersecurity Market Analysis
- Sustained Activity by Threat Actors- Joint Publication
- Developing National Vulnerabilities Programmes
- Interoperable EU Risk Management Toolbox
- 2023 Interoperable EU RM Toolbox
- Demand Side of Cyber Insurance in the EU
- Building Effective Governance Frameworks for the Implementation of National Cybersecurity Strategies
- A Governance Framework for National Cybersecurity Strategies
- Embedded Sim Ecosystem, Security Risks and Measures
- Fog and Edge Computing in 5G
- ENISA Transport Threat Landscape
- ENISA Single Programming Document 2023-2025 Condensed
- ENISA Single Programming Document 2023-2022 Condensed
- ENISA Foresight Cybersecurity Threats for 2030
- 5G Security Controls Matrix
- European Cybersecurity Month 2022 Campaign Report
- Cybersecurity Support Action
- 5G Matrix
- DNS Identity
- Trust Services-Secure move to the cloud of the eIDAS ecosystem
- Cybersecurity and privacy in AI - Forecasting demand on electricity grids
- Cybersecurity and privacy in AI - Medical imaging diagnosis
- Multilayer Framework for Good Cybersecurity Practices for AI
- Artificial Intelligence and Cybersecurity Research
- Good Practices for Supply Chain Cybersecurity
- Digital Identity Standards
- Health Threat Landscape
- Undersea cables
- Foresight 2030 Threats
- ENISA Threat Landscape 2023
- NIS Investments Report 2023
- ENISA Threat Landscape for DoS Attacks
- Engineering Personal Data Protection in EU Data Spaces
- Market of Cybersecurity Assessments
- Low Earth Orbit (LEO) SATCOM Cybersecurity Assessment
- Cyber Insurance - Models and methods and the use of AI
- Trust Services Security Incidents 2022
- Best Practices for Cyber Crisis Management
- Remote ID Proofing - Good practices
- Foresight Cybersecurity Threats For 2030 - Update 2024: Executive Summary
- Foresight Cybersecurity Threats For 2030 - Update 2024
- Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
- Foresight Cybersecurity Threats For 2030 - Update 2024: Extended report
- Cybersecurity Education Maturity Assessment
- European Cybersecurity Month 2023 - Campaign report
- ENISA Threat Landscape 2024
- Cryptographic Products and Services Market Analysis
- Press & Media
- Recruitment
- Public Procurement
- Faceted search
-
Topics
- Cyber Crisis Management
- Cloud
- National Cybersecurity Strategies
- Emerging Technologies
- Critical infrastructure
- Incident Reporting
- Cyber Threats
- Standards
- Awareness Raising
- COVID19
- Vulnerability Disclosure
- Cybersecurity Policy
- Cryptography
- Research and Innovation
- Education
- Incident response
- Risk Management
- Certification
- Training and Exercises
- Foresight
- Site search
- On-line tool for the security of personal data processing
- Tools
- Tips for cybersecurity when working from home
- Seasons greetings 2020
- 5G_twitter_1200x675_01.jpg
- ENISA Cyberhead Education DB.zip