Search results

197 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
File PDF document Klaus Peter KOSSAKOWSKI, TI Cyber Response Teams in Europe and beyond
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Lauri PALKMETS, ENISA Technical trainings for CERTs
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Pieter WELLENS, DIGIT The sTesta infrastructure
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Kaur KASAK, NATO CCDCOE Lessons learned from the Locked Shields 2013 exercise
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Wolfgang ROEHRIG, EDA Mainstreaming European Military Cyber Defence Training and Exercises
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Marnix DEKKER, ENISA – European Network and Information Security Incidents Report 2012
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Costas EFTHYMIOU, OCECPR, Cyprus – The Cyprus efforts in NRA and National Contingency Plans
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Panagiotis TRIMINTZIOS, ENISA ENISA’s Guide on National Risk Assessment for ICT
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Ilias CHANTZOS, Symantec The trends of cyber incidents leading to large scale cyber crises
Located in Events / 2nd International Conference (Athens, 2013) / Presentations
File PDF document Jason THELEN, Atlantic Council US Global Aggregation of Cyber Risk
Located in Events / 2nd International Conference (Athens, 2013) / Presentations

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information