Search results

519 items matching your search terms.
Filter the results.
Item type






































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study Incentives and Barriers to Information Sharing
The importance of information sharing to ensuring network and information security is widely acknowledged by both policy-makers and by the technical and practitioner community – for example, in the European Programme on Critical Infrastructure Protection (EPCIP) and in the 2004 Availability and Robustness of Electronic Communications Infrastructures (ARECI) study, which noted that formal means for sharing information should be set up in order to ―improve the protection and rapid restoration of infrastructure critical to the reliability of communications within and throughout Europe‖. A 2009 gap analysis conducted by ENISA of good practice in respect of telecommunication network operators identified information sharing as a set of useful best practice. Given the acknowledged importance of information sharing, this report sets out findings from a research project into the barriers to and incentives for information sharing in the field of network and information security, in the context of peer-to-peer groups such as Information Exchanges (IE) and Information Sharing Analysis Centres (ISACs).
Located in Publications
ENISA Workshop on Cyber security for IoT in Smart Home Environments
The European Union Agency for Network and Information security (ENISA) is organising a one day conference focused on Cyber Security for the Internet of Things (IoT) in Smart Home Environments.
Located in Events
ENISA Workshop on Cyber security for Public Transport in Smart Cities
The European Union Agency for Network and Information security (ENISA) is organising a one day conference focused on Cyber Security for Public Transport in Smart Cities.
Located in Events
Report/Study chemical/x-pdb Information sharing and common taxonomies between CSIRTs and Law Enforcement
This Report on Information Sharing and Common Taxonomies between CSIRTs and Law Enforcement Agencies (LEAs) was produced at the initiative of ENISA with the objective to enhance cooperation both between the Member States (MS) of the EU and between related Network and Information Security (NIS) communities. With this study, which is a continuation of ENISA’s work done in the area of fight against cybercrime, ENISA aims at identifying which information can be shared between CSIRTs and LEAs and how this can be achieved from a technical and organisational perspective.
Located in Publications
Report/Study Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches
This study aims to present the regulatory and non-regulatory approaches of EU Member States as well as EEA and EFTA countries to share information on cyber incidents, the different sector regulation challenges of managing cyber security issues, and their key practices in addressing them. The study identifies three types of approaches to share information on cyber security incidents: 1) traditional regulation; 2) alternative forms of regulation, such as self- and co-regulation; 3) other approaches to enable information sharing, such as information and education schemes.
Located in Publications
Report/Study Definition of Cybersecurity - Gaps and overlaps in standardisation
This document analyses the usage of this term by various stakeholders and reviews standardisation activities in the area of Cybersecurity, providing an overview of overlaps and gaps in available standards. It has been written by CSCG and ENISA experts as a response to the Recommendation #2 and forms a logical entity together with the response to the CSCG Recommendation #1, Governance framework of the European standardisation – Aligning Policy, Industry and Research, published by ENISA at the same time.
Located in Publications
Report/Study Octet Stream Recommended cryptographic measures - Securing personal data
This document addresses the protection measures applied to safeguard sensitive and/or personal data, which has been acquired legitimately by a data controller. In this respect it discusses how information technology users, who have a basic knowledge of information security, can employ cryptographic techniques to protect personal data. Finally, it addresses the need for a minimum level of requirements for cryptography across European Union (EU) Member States (MSs) in their effort to protect personal and/or sensitive data. This document is complemented with a set of technical recommendations for algorithms, key sizes, parameters and protocols, which is part of another study published by ENISA.
Located in Publications
ENISA eHealth security workshop
ENISA is organising together with the European Commission the first workshop on eHealth systems security. Cyber security experts with focus on eHealth systems are invited to attend this one day workshop and learn more on the activities of ENISA and the EC on the specific topics.
Located in Events
ENISA Information Security Workshop
Located in Events / ENISA Events
ENISA Information Security Workshop 2015
ENISA workshop on Information Security is an event aimed at raising awareness on Information Security at the highest organisational level, providing brief overview of relevant standards, frameworks and methodologies.
Located in Events / ENISA Events

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more