Search results

18 items matching your search terms.
Filter the results.
Item type





























































New items since



Sort by relevance · date (newest first) · alphabetically
Privacy and Network Information Security in Education
Every year in Brussels, CPDP gathers policy makers, academics, computer scientists, consultants, practitioners and activists from all over the world to exchange ideas and discuss emerging issues in information technology, privacy, data protection and law. CPDP has been growing progressively since its inception in terms of speakers, participants and panels. Ambitions for CPDP 2014 are higher than ever, and we aim to stage more than 40 panels and workshops (with a stimulating mix of academics, practitioners, regulators and advocates), as well as multiple side events (such as open debates, Pecha-Kucha performances and artistic interventions).
Located in Events
‘Code Week for all’: 3rd week of The European Cyber Security Month!
Located in News / ENISA News
Launch of European Cyber Security Month logo
Launch of European Cyber Security Month logo
Located in News / ENISA News
‘Creating a Culture of Cyber Security at Work’, second week of The European Cyber Security Month running through October
Located in News / ENISA News
Digital Agenda Seminar: European Cyber Security Month
Located in News / ENISA News
Mobile Threats Incident Handling: Updated ENISA material
Located in News / ENISA News
EU citizens’ training on eSkills: evaluation of the European Cyber Security Month 2015 and head start for 2016
Located in News / ENISA News
Report/Study Cybersecurity Research Directions for the EU’s Digital Strategic Autonomy
The focus of this work is to identify the necessary research priorities to support the EU’s digital strategic autonomy and thus digital sovereignty. In this introductory chapter, we (i) analyse how the terms ‘digital strategic autonomy’ and ‘digital sovereignty’ have been used and propose the definition used in this report, (ii) define the scope and target audience, and (iii) outline the structure of the report.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information