Search results

638 items matching your search terms.
Filter the results.
Item type















































New items since



Sort by relevance · date (newest first) · alphabetically
File PDF document cyber_security_strategy_2014-2017_public_version.pdf
Located in Topics / National Cyber Security Strategies / National Cyber Security Strategies (NCSSs) Map
File PDF document Czech Republic Cyber Security Strategy
Located in Topics / National Cyber Security Strategies / National Cyber Security Strategies (NCSSs) Map
File PDF document Austria Cyber Security Strategy
Located in Topics / National Cyber Security Strategies / National Cyber Security Strategies (NCSSs) Map
Image JPEG image world
Located in Topics / National Cyber Security Strategies / National Cyber Security Strategies (NCSSs) Map
Image JPEG image EU
Located in Topics / National Cyber Security Strategies / National Cyber Security Strategies (NCSSs) Map
Image JPEG image Strategy
Located in Topics / National Cyber Security Strategies / National Cyber Security Strategies (NCSSs) Map
New EU Cybersecurity strategy & Directive announced
Today, Thursday, 7th of February the European Commission and the High Representative of the European Union for Foreign Affairs and Security Policy announced the EU's Cybersecurity Strategy, and a complementary proposal for a Directive on measures to ensure a high common level of cyber security across the EU.
Located in News / ENISA News
Security is key for BYOD
Whether it’s a laptop, tablet or smartphone, more and more of us are choosing to “bring your own device” (BYOD) to carry out tasks in the workplace, or perform work activities from home or other locations. The trend, also known as consumerization of IT (COIT), can be very attractive to both employers and workers, offering flexibility both ways.
Located in News / ENISA News
Report/Study Troff document Consumerization of IT: Final report on Risk Mitigation Strategies and Good Practices
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.
Located in Publications
Consumerization of IT: Risk Assessment and Risk Mitigation Strategies and Good Practices
ENISA has produced a risk and opportunity assessment and risk mitigation strategies in the area of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this work is to assess the risks and identify mitigation strategies, policies and controls for the assessed risks. At the same time, mitigation has been proposed in a way that leaves the windows for the realization of the assessed opportunities open.
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information