ENISA
https://www.enisa.europa.eu
CSIRT Setting up Guide in Slovak
https://www.enisa.europa.eu/publications/csirt-setting-up-guide-in-slovak
The document at hand describes the process of setting up a Computer Security and Incident Response Team (CSIRT) from all relevant perspectives like business management, process management and technical perspective.No publisherCSIRTs2010/12/22 14:31:50 GMT+2Report/StudyCSIRT Setting up Guide in Romanian
https://www.enisa.europa.eu/publications/csirt-setting-up-guide-in-romanian
The document at hand describes the process of setting up a Computer Security and Incident Response Team (CSIRT) from all relevant perspectives like business management, process management and technical perspective.No publisherCSIRTs2010/12/22 14:31:59 GMT+2Report/StudyCSIRT Setting up Guide in Slovenian
https://www.enisa.europa.eu/publications/csirt-setting-up-guide-in-slovenian
The document at hand describes the process of setting up a Computer Security and Incident Response Team (CSIRT) from all relevant perspectives like business management, process management and technical perspective.No publisherCSIRTs2010/12/22 14:32:08 GMT+2Report/StudyCSIRT Setting up Guide in Swedish
https://www.enisa.europa.eu/publications/csirt-setting-up-guide-in-swedish
The document at hand describes the process of setting up a Computer Security and Incident Response Team (CSIRT) from all relevant perspectives like business management, process management and technical perspective.No publisherCSIRTs2010/12/22 14:32:17 GMT+2Report/StudyCSIRT Setting up Guide in Chinese
https://www.enisa.europa.eu/publications/csirt-setting-up-guide-in-chinese-mandarin
The document at hand describes the process of setting up a Computer Security and Incident Response Team (CSIRT) from all relevant perspectives like business management, process management and technical perspective.No publisherCSIRTs2011/03/08 12:49:29 GMT+2Report/StudyCSIRT Setting up Guide in Hindi
https://www.enisa.europa.eu/publications/csirt-setting-up-guide-in-hindi
The document at hand describes the process of setting up a Computer Security and Incident Response Team (CSIRT) from all relevant perspectives like business management, process management and technical perspective.No publisherCSIRTs2011/03/08 12:49:53 GMT+2Report/StudyGood Practice Guide for Incident Management
https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management
This guide complements the existing set of ENISA guides that support Computer Emergency Response Teams. It describes good practices and provides practical information and guidelines for the management of network and information security incidents with an emphasis on incident handling.No publisherIncident ResponseGood PracticeCSIRTsTrainingsCSIRTsIncident Reporting2010/12/20 09:30:00 GMT+2Report/StudyProactive detection of network security incidents, report
https://www.enisa.europa.eu/publications/proactive-detection-report
This report describes available external sources of information and internal monitoring tools which can be used by CERTs to improve their capabilities to detect network security incidents.No publisherCSIRTsCSIRTs2011/12/07 00:05:00 GMT+2Report/StudyProactive detection of network security incidents, CERT survey analysis
https://www.enisa.europa.eu/publications/survey-analysis
This is Appendix II to the report on proactive detection of network security incidents. It contains analysis of the CERT survey which was part of the projectNo publisherCSIRTsCSIRTs2011/12/07 00:05:00 GMT+2Report/StudyProactive detection of security incidents II - Honeypots
https://www.enisa.europa.eu/publications/proactive-detection-of-security-incidents-II-honeypots
An increasing number of complex attacks demand improved early warning detection capabilities for CERTs. By having threat intelligence collected without any impact on production infrastructure, CERTs can better defend their constituencies assets. Honeypots are powerful tools that can be used to achieve this goal. This document is the final report of the ‘Proactive Detection of Security Incidents: Honeypots’ study.No publisherCSIRTsCSIRTs2012/11/22 00:05:00 GMT+2Report/StudyGood Practice Guide on Vulnerability Disclosure. From challenges to recommendations
https://www.enisa.europa.eu/publications/vulnerability-disclosure
Vulnerabilities are ‘flaws’ or ‘mistakes’ in computer-based systems that may be exploited to compromise the network and information security of affected systems. They provide a point-of-entry or gateway to exploit a system and as such pose potentially severe security risks. Fixing vulnerabilities is therefore crucial and the process of disclosing vulnerabilities is a vital component that cannot be underestimated.No publisherCSIRTs2016/01/18 00:00:00 GMT+2Report/StudyScalable and Accepted Methods for Trust Building
https://www.enisa.europa.eu/publications/scalable-and-accepted-methods-for-trust-building
One of ENISA’s role is that of community builder. In order to properly fulfill this role, ENISA must have a better insight at what makes or breaks a community – trust. This report takes a first informal look at how communities build and maintain trust, by looking at four different operational communities. This report highlights commonalities and differences, and gives a first set of recommendations to enhance trust in a community.No publisherCSIRTs2014/11/27 15:55:00 GMT+2Report/StudyDetect, SHARE, Protect - Solutions for Improving Threat Data Exchange among CERTs
https://www.enisa.europa.eu/publications/detect-share-protect-solutions-for-improving-threat-data-exchange-among-certs
The focus of this report is on the threat and incident information exchange and sharing practices used among CERTs in Europe, especially, but not limited to, national/governmental CERTs. It aims at: - Taking stock of existing communication solutions and practices among European CERTs - Identifying the functional and technical gaps that limit threat intelligence exchange between n/g CERTs and their counterparts in Europe, as well as other CERTs within their respective countries - Defining basic requirements for improved communications interoperable with existing solutionsNo publisherCSIRTsCSIRTs2013/11/20 02:00:00 GMT+2Report/Study8th ENISA Workshop ‘CERTs in Europe’ report
https://www.enisa.europa.eu/publications/8th-enisa-workshop-certs-in-europe-report
This document is a brief ENISA report on the annual workshop for Computer Emergency Response Teams in Europe “CERTs in Europe”. The first part of the workshop focused on hands-on technical training for non- governmental CERTs in Europe. Part II of the workshop, the ENISA/EC3 workshop, is a follow up event to last years's workshop with Europol and it has the same focus on cooperation between n/g CERTs in Europe and their national law enforcement counterparts. No publisherCSIRTsCSIRTs2013/11/18 10:00:00 GMT+2Report/StudyBaseline capabilities for national / governmental CERTs (Part 1 Operational Aspects)
https://www.enisa.europa.eu/publications/baseline-capabilities-for-national-governmental-certs
This document constitutes a very first attempt to define a minimum set of capabilities that a Computer Emergency Response Team (CERT) in charge of protecting critical information infrastructure (CIIP) in the Member States should possess to take part and contribute to a sustainable cross-border information sharing and cooperation. In areas where no clear statements can be made with regards to requirements the document points out recommendations and areas for further analysis in the future. This first version was derived from the answers to a survey ENISA carried out among all 120+ publicly listed CERTs in Europe. It should be considered only as a first step towards the specification of requirements, which is an ongoing process that has and will involve discussions with the relevant stakeholders in the Member States. No publisherCSIRTs2009/12/15 14:45:00 GMT+2Report/Study