Search results

197 items matching your search terms.
Filter the results.
Item type
















































New items since



Sort by relevance · date (newest first) · alphabetically
File PDF document Mats NILSSON, Eriksson Supply Chain Integrity and Security Assurance for ICT
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Luigi ROMANO, University of Naples Parthenope The Big Challenge, Building Trust while favouring Openness
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Kostas PANAGOS, Vodafone A trusted supplier counts
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Jason THELEN, Atlantic Council US Global Aggregation of Cyber Risk
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Ilias CHANTZOS, Symantec The trends of cyber incidents leading to large scale cyber crises
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Panagiotis TRIMINTZIOS, ENISA ENISA’s Guide on National Risk Assessment for ICT
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Costas EFTHYMIOU, OCECPR, Cyprus – The Cyprus efforts in NRA and National Contingency Plans
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Marnix DEKKER, ENISA – European Network and Information Security Incidents Report 2012
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Wolfgang ROEHRIG, EDA Mainstreaming European Military Cyber Defence Training and Exercises
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Kaur KASAK, NATO CCDCOE Lessons learned from the Locked Shields 2013 exercise
Located in Events / 2nd International Conference (Athens, 2013) / Presentations

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information