ENISA
https://www.enisa.europa.eu
International Cooperation: ENISA Welcomes EU Eastern Partnership Delegation for a Study Visit to its Headquarters
https://www.enisa.europa.eu/news/enisa-news/international-cooperation-enisa-welcomes-eu-eastern-partnership-delegation-for-a-study-visit-to-its-headquarters
The European Union Agency for Cybersecurity (ENISA) opened its doors in Athens to cybersecurity representatives from Armenia, Azerbaijan, Georgia, Moldova and Ukraine.No publisherCybersecurity2022/10/04 10:43:00 GMT+2News ItemRailway Cybersecurity
https://www.enisa.europa.eu/publications/railway-cybersecurity
This ENISA study regards the level of implementation of cybersecurity measures in the railway sector, within the context of the enforcement of the NIS Directive in each European Member State. It presents a thorough list of essential railway services accompanied by a high level overview of the railway systems they support. Finally, the European Railway Traffic Management System is presented together with some key cybersecurity considerations and recommendations. No publisherCybersecurityRail2020/11/13 11:00:00 GMT+2Report/StudyTelecom Security During a Pandemic
https://www.enisa.europa.eu/publications/telecom-security-during-a-pandemic
The COVID-19 pandemic not only highlighted the importance of electronic communication networks and services for the EU’s society and economy, but it also triggered major changes and challenges in their use in the EU and worldwide. In this paper, we look at the role telecom providers played in ensuring the security and resilience of the services and networks during the pandemic highlighting good practices that providers and authorities implemented to help alleviate the pandemic’s impact on the sector. As general takeaway, services and networks have been resilient during the crisis, despite major changes in usage and traffic. Moreover, the perception of consumers shifted: electronic communication networks are now considered as a lifeline for citizens and crucial for the economy and society.No publisherArticle 13aCybersecurityTelecom2020/11/26 13:00:00 GMT+2Report/Study5G Supplement - to the Guideline on Security Measures under the EECC
https://www.enisa.europa.eu/publications/5g-supplement-security-measures-under-eecc
This document contains a 5G technology profile which supplements the technology-neutral Guideline on Security Measures under the EECC. The document gives additional guidance to competent national authorities about how to ensure implementation and strengthening of security measures by mobile network operators for mitigation of risks to 5G networks. The supplement focuses on the cybersecurity of 5G networks at the policy level relating to the EU 5G toolbox and at the technical level for new technologies, such as virtualisation, slicing and edge computing. This is the second edition of this publication.No publisherCybersecurityNIS Directive5GEECC (European Electronic Communications Code EECC)Telecom2020/12/10 13:00:00 GMT+2Report/StudyGuideline on Security Measures under the EECC
https://www.enisa.europa.eu/publications/guideline-on-security-measures-under-the-eecc
This document, the Technical Guideline for Security Measures, provides guidance to competent authorities about the technical details of implementing Articles 40 and 41 of the EECC: how to ensure that providers assess risks and take appropriate security measures. The guideline lists 29 high-level security objectives, which are grouped in 8 security domains. For each security objective we list specific detailed security measures which could be taken by providers to reach the security objective. These security measures are grouped in 3 levels of increasing sophistication. We also give examples of evidence, which could be taken into account by an auditor, for example, when assessing if these security measures are actually in place.No publisherCybersecurityNIS DirectiveEECC (European Electronic Communications Code EECC)Telecom2020/12/10 13:00:00 GMT+2Report/StudyGuidelines - Cyber Risk Management for Ports
https://www.enisa.europa.eu/publications/guidelines-cyber-risk-management-for-ports
This report aims to provide port operators with good practices for cyber risk assessment that they can adapt to whatever risk assessment methodology they follow. In order to achieve this, this report introduces a four-phase approach to cyber risk management for port operators, which follows common risk management principles and is mapped to the steps of the risk assessment methodology that is laid out in the ISPS Code and relevant EU legislation for Port and Port Facility Security. For each of these phases, this report provides actionable guidelines to assist port operators in their efforts, lists common challenges associated with the performance of the relevant activities, good practices that can be readily adopted and customised by individual organisations and a mapping of the listed good practices for each phase with the respective challenges they address. No publisherCybersecurityNIS DirectiveNational NIS StrategiesMaritime2020/12/17 15:00:00 GMT+2Report/StudyCybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving
https://www.enisa.europa.eu/publications/enisa-jrc-cybersecurity-challenges-in-the-uptake-of-artificial-intelligence-in-autonomous-driving
This report, drafted jointly by ENISA and JRC, aims to provide insights on the cybersecurity challenges specifically connected to the uptake of AI techniques in autonomous vehicles. It describes the policy context at both the European and international levels. It delves then into the technical aspects of AI in the automotive sector, with the aims to better comprehend the technological concerns and to get a sense of the level of integration of AI in AV. This includes an extended description of the areas in which AI plays a role, to ensure the proper implementation of cognitive capabilities inside automotive systems. After this technical presentation, a state-of-the-art literature survey on security of AI in the automotive context. A set of challenges and recommendations is also provided to improve AI security in AVs and mitigate potential threats and risks.No publisherCybersecuritySmart CarsTransportInternet of things2021/02/11 13:00:00 GMT+2Report/StudySituational Report on Microsoft Exchange Vulnerabilities
https://www.enisa.europa.eu/publications/situational-report-on-microsoft-exchange-vulnerabilities
This ENISA situation report provides an assessment as well as advice and mitigation measures for the MS Exchange vulnerabilities. The threat for the new updates has been assessed as severe and ENISA considers attacks probable and of high risk. The Agency calls on organisations using affected Microsoft Exchange versions to patch the flaws immediately and thoroughly investigate for potential signs of compromise. MS Exchange vulnerabilities once exploited may lead to network compromise, data exfiltration and ransomware attacks. Across the EU, an increasing number of MS Exchange installations have also been found to be the target of malicious attacks. No publisherCybersecurityVulnerabilities2021/03/19 13:30:00 GMT+2Report/Study2023 CTI- EU Conference powered by ENISA
https://www.enisa.europa.eu/events/2023-cti-eu-conference
No publisherCTI-EUENISA eventsCyber Threat IntelligenceCyber Threat AnalysisCybersecurityCybersecurity EducationCTI2023/06/21 14:16:00 GMT+2EventAd-Hoc Working Group on Artificial Intelligence Cybersecurity
https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/artificial_intelligence/ad-hoc-working-group
No publisherCybersecurity2021/02/19 17:32:11 GMT+2FolderAd-Hoc Working Group on Emerging and Future Cybersecurity Challenges
https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/artificial_intelligence/ad-hoc-working-group-on-emerging-and-future-cybersecurity-challenges
No publisherCybersecurity2021/02/22 00:00:00 GMT+2FolderAd-Hoc Working Group on Foresight On Emerging And Future Cybersecurity Challenges
https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/artificial_intelligence/ad-hoc-working-group-on-emerging-and-future-cybersecurity-challenges
The application period for the selection of members for ENISA's Ad-Hoc Working group on "Foresight On Emerging And Future Cybersecurity Challenges" is now closed.No publisherCybersecurity2021/02/28 00:00:00 GMT+2PageTerms of Reference - Ad-Hoc Working Group on Emerging and Future Cybersecurity Challenges
https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/artificial_intelligence/ad-hoc-working-group-on-emerging-and-future-cybersecurity-challenges/terms-of-reference/view
No publisherCybersecurity2021/02/28 00:00:00 GMT+2FilePrivacy Statement
https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/artificial_intelligence/ad-hoc-working-group-on-emerging-and-future-cybersecurity-challenges/privacy-statement/view
No publisherCybersecurity2021/02/28 00:00:00 GMT+2FileAd-Hoc Working Group on Awareness Raising
https://www.enisa.europa.eu/topics/cybersecurity-education/ad-hoc-working-group-awareness-raising
No publisherCybersecurity2021/03/22 00:00:00 GMT+2Folder