This tool helps Small and Medium-sized business enhance their cybersecurity maturity level and provide them with an adaptive progressive plan to handle cybersecurity risks.

This tool helps CSIRTs to self-assess their team’s maturity in terms of 44 parameters of the SIM3 model. SIM3 is also at the base of TI certification scheme under the TF-CSIRT and considered by FIRST for membership process. For several parameters, ENISA CSIRT maturity assessment model requires higher assessment level then it is required under the TI certification scheme. This is due to NIS Directive requirements that have been recently identified for EU MS designated CSIRTs.

The main objective of the NCAF is to measure the maturity level of the cybersecurity capabilities of the Member States to support them in conducting an evaluation of their national cybersecurity capability, enhancing awareness of the country maturity level, identifying areas for improvement and building cybersecurity capabilities.

How to secure your employees and business from cyberattacks. Cybersecurity doesn’t necessarily have to be costly for SMEs to implement and maintain. There are several measures that can be implemented, without the company having to invest a large amount.

Navigate through this tool and gain knowledge on cybersecurity requirements for procurement of services, products and infrastructure in Hospitals. Information can be directly used in the RfP of any related service or product.

This tool helps CSIRTs to self-assess their team’s maturity in terms of 44 parameters of the SIM3 model. SIM3 is also at the base of TI certification scheme under the TF-CSIRT and considered by FIRST for membership process. For several parameters, ENISA CSIRT maturity assessment model requires higher assessment level then it is required under the TI certification scheme. This is due to NIS Directive requirements that have been recently identified for EU MS designated CSIRTs.

This is a comprehensive toolkit for establishing and developing Information Sharing and Analysis Centres, or ISACs. It includes activities, documents and tools, everything you need to set up and run an ISAC. The toolkit is divided into 4 different phases corresponding to the development of the ISAC. Each phase contains different topics for developing the organisation in that particular phase.

The assessment of risks is the first step towards the adoption of appropriate security measures for the protection of personal data. Within the next steps we present a simplified approach that can guide the SMEs through their specific data processing operation and help them evaluate the relevant security risks.

Interactive table of the NIS Cooperation Group Security Measures for OES

The Mapping of Security Measures for OES Tool provides the mapping of security measures for OESs to international standards used by operators in the business sectors (namely energy, transport, banking, financial market infrastructures, health, drinking water supply & distribution and digital infrastructures).

The Tool contributes to achieve a common and converged level of security in network and information systems (Article 3 of the NIS Directive) at EU level and it does not intends to replace existing standards, frameworks or good-practices in use by OESs.

The European CSIRT Inventory gives an overview of the actual situation concerning CSIRT teams in Europe. It provides a list of publicly listed incident response teams that can be visualised by the interactive mapping tool. This tool allows the reader to filter the displayed teams by (NIS Directive) CSIRTs Network membership, per-country, region, or type of CSIRT (e.g. national CSIRTs). ENISA’s CSIRT-relations team updates the Inventory twice a year (Q2, Q4).

The ENISA NCSS Interactive Map lists all the documents of National Cyber Security Strategies in the EU together with their strategic objectives and good examples of implementation. ENISA's goal is to create an info-hub with information provided by the Member States on their efforts to enhance national cybersecurity.

ENISA created this tool to help Member States evaluate their strategic priorities and objectives related to National Cyber Security Strategies.

Select your country's cyber security priorities and answer a few simple questions (with a YES or a NO) to reveive ideas and advice for improvement. The questionnaire is sectioned in 15 objectives and no data are being collected.

The Cybersecurity Higher Education Database (CyberHEAD) is the largest validated cybersecurity higher education database in the EU and EFTA countries. It has been the main point of reference for all citizens looking to upskill their knowledge in the cybersecurity field. This list allows young talents to make informed decisions on the variety of possibilities offered by higher education in cybersecurity and helps universities attract high-quality students motivated in keeping Europe cyber-secure.

Filters
by topics
by tags
by publishing date

This site uses cookies to offer you a better browsing experience.
Aside from essential cookies we also use tracking cookies for analytics.
Find out more on how we use cookies.

Accept all cookies Accept only essential cookies