ENISA
https://www.enisa.europa.eu
Ad-Hoc Working Group on Enterprise Security
https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity/ad-hoc-working-group-enterprise-security
ENISA seeks to interact with a stakeholders representing the EU MS for the purpose of collecting input on a number of relevant aspects regarding SMEs.No publisherCybersecurity2021/03/22 00:00:00 GMT+2PagePrivacy Statement
https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity/ad-hoc-working-group-enterprise-security/privacy-statement/view
No publisherCybersecurity2021/03/22 00:00:00 GMT+2FileAd-Hoc Working Group on Enterprise Security
https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity/ad-hoc-working-group-enterprise-security
No publisherCybersecurity2021/03/22 00:00:00 GMT+2FolderSME Cybersecurity
https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity
No publisherSMECybersecurity2020/11/24 12:12:00 GMT+2TopicAd Hoc Working Group 04 - on EU Cybersecurity Market
https://www.enisa.europa.eu/topics/market/ad-hoc-working-group-on-cybersecurity-market
No publisherCybersecurity2021/07/29 23:00:00 GMT+2PageMethodology for Sectoral Cybersecurity Assessments
https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
The methodology for sectoral cybersecurity assessments described in this document (called SCSA Methodology) addresses objectives in the context of ICT security for sectoral multi-stakeholder systems and drafting sectoral cybersecurity certification schemes. Applying the SCSA Methodology will generate sound information about the sectoral ICT system and relationships between the stakeholders involved, providing transparency concerning ICT-related risks and the potential to optimize the implementation of ICT security for the sectoral ICT system. It also enables full support for the European Cybersecurity Act’s requirements concerning the risk-based identification of security and assurance requirements.No publisherCertificationMethodologyCybersecurity2021/09/13 11:00:00 GMT+2Report/StudyTelecom & Trust Services Incidents in 2021: Over-The-Top (OTT) Challenges Emerging
https://www.enisa.europa.eu/news/telecom-trust-services-incidents-in-2021-over-the-top-ott-challenges-emerging
The European Union Agency for Cybersecurity (ENISA) releases today the 2021 incident reports on telecom and trust services.No publisherJuhan LepassaarTelecomCybersecurityIncident Reporting2022/07/27 12:00:00 GMT+2Press ReleaseeHealth Conference: Sector Matures in terms of Cybersecurity but not fast enough
https://www.enisa.europa.eu/news/ehealth-conference-sector-matures-in-terms-of-cybersecurity-but-not-fast-enough
Organised with the support of the Danish Health Data Authority, the European Union Agency for Cybersecurity (ENISA) hosted the 7th eHealth conference on the latest developments in policy and emerging challenges of the evolving threat landscape.No publisherCybersecurityehealthpolicy2022/10/18 16:55:00 GMT+2News ItemNew Tool is another step towards securing the Digital Future of SMEs
https://www.enisa.europa.eu/news/enisa-news/new-tool-is-another-step-towards-securing-the-digital-future-of-smes
The European Union Agency for Cybersecurity (ENISA) announces the creation of the “SecureSME Tool”. A practical and user-friendly tool facilitating SMEs to navigate to ENISA’s tips, guidelines and recommendation.No publisherSMEsCybersecurity2021/09/08 12:00:00 GMT+2News ItemENISA Strategy - A Trusted and Cyber Secure Europe
https://www.enisa.europa.eu/publications/corporate-documents/a-trusted-and-cyber-secure-europe-enisa-strategy/view
No publisherCybersecurityENISA2020/07/17 12:30:00 GMT+2FileENISA Annual Activity Report 2019
https://www.enisa.europa.eu/publications/corporate-documents/enisa-annual-activity-report-2019/view
No publisherCybersecurityENISA2020/07/20 17:05:00 GMT+2FileGood Practices for Security of IoT - Secure Software Development Lifecycle
https://www.enisa.europa.eu/publications/good-practices-for-security-of-iot-1
This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT ecosystem, is a fundamental building block for IoT security. By providing good practices on how to secure the IoT software development process, this study tackles one aspect for achieving security by design, a key recommendation that was highlighted in the ENISA Baseline Security Recommendations study which focused on the security of the IoT ecosystem from a horizontal point of view.No publisherCybersecurityInternet of things2019/11/19 16:00:00 GMT+2Report/StudyENISA threat landscape for 5G Networks
https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-5g-networks
This report draws an initial threat landscape and presents an overview of the challenges in the security of 5G networks. Its added value lays with the creation of a comprehensive 5G architecture, the identification of important assets (asset diagram), the assessment of threats affecting 5G (threat taxonomy), the identification of asset exposure (threats – assets mapping) and an initial assessment of threat agent motives. The information produced for this Threat Landscape is based on publicly available information published by 5G standardisation groups and bodies (i.e. ETSI, 3GPP, 5GPPP) and 5G stakeholders such as operators, vendors, national and international organisations. An expert group with experts from mobile operators, vendors, research and European Commission has contributed to ENISA’s work with information on existing 5G material, current developments in the market and research and quality assurance of the current document. Moreover, the members of the NIS CG, European Commission and ENISA have reviewed the current document.No publisherCybersecurity5G Threats5GENISA2019/11/21 10:00:00 GMT+2Report/StudyEU Member States incident response development status report
https://www.enisa.europa.eu/publications/eu-ms-incident-response-development-status-report
Following the recent transposition of the NIS Directive1 (NISD) into European Member States (MS) legislation, this study aims to analyse the current operational Incident Response set-up within NISD sectors2 and identify the recent changes. The study provides a deeper insight into NISD sectoral Incident Response capabilities, procedures, processes and tools to identify the trends and possible gaps and overlaps. Incident Response Capabilities (IRC) within NISD sectors is a growing concern to tackle potential incidents which could have a major impact on European societies and citizens. ToNo publisherCybersecurityIncident Reporting2019/11/27 11:45:00 GMT+2Report/StudyPort Cybersecurity - Good practices for cybersecurity in the maritime sector
https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector
Developed in collaboration with several EU ports, this report intends to provide a useful foundation on which CIOs and CISOs of entities involved in the port ecosystem, especially port authorities and terminal operators, can build their cybersecurity strategy. The study lists the main threats posing risks to the port ecosystem and describes key cyber-attack scenarios that could impact them. This approach allowed the identification of security measures that ports shall put in place to better protect themselves from cyberattack. The main measures identified intend to serve as good practices for people responsible for cybersecurity implementation. The study can be useful for other stakeholders in the broader community within the port ecosystem, such shipping companies and maritime policy makers.No publisherCybersecurityENISAPortMaritime2019/11/26 11:30:00 GMT+2Report/Study