Cyber-security regulation

Results: 835



#Item
41TECHNICAL STUDIES  Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards,

TECHNICAL STUDIES Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards,

Add to Reading List

Source URL: www.clusif.fr

Language: English - Date: 2014-09-16 09:37:13
42COUNTRY: GERMANY Germany has a comprehensive cybersecurity strategy, adopted in 2011 and complemented by a strong cybersecurity legal framework. The existence of the Federal Office for Information Security (BSI), in char

COUNTRY: GERMANY Germany has a comprehensive cybersecurity strategy, adopted in 2011 and complemented by a strong cybersecurity legal framework. The existence of the Federal Office for Information Security (BSI), in char

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:08:32
43STUMBLING BLOCKS IN THE PATH TO TRUE SECURITY Some governments today are invoking cybersecurity as a justification for a variety of policies that go beyond what is needed to address legitimate security concerns. In fact,

STUMBLING BLOCKS IN THE PATH TO TRUE SECURITY Some governments today are invoking cybersecurity as a justification for a variety of policies that go beyond what is needed to address legitimate security concerns. In fact,

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-03-06 14:56:48
44Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Add to Reading List

Source URL: www.westholland.cn

Language: English - Date: 2015-03-31 09:09:36
45COUNTRY: CROATIA Croatia has yet to establish a comprehensive cybersecurity strategy or a well-developed system of public-private partnerships. Croatia has two established computer emergency response teams (CERTs). The N

COUNTRY: CROATIA Croatia has yet to establish a comprehensive cybersecurity strategy or a well-developed system of public-private partnerships. Croatia has two established computer emergency response teams (CERTs). The N

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:14:54
46EVENT PARTNERS  SPONSORS KNOWLEDGE PARTNERS

EVENT PARTNERS SPONSORS KNOWLEDGE PARTNERS

Add to Reading List

Source URL: cyfy.org

Language: English - Date: 2014-10-06 04:48:13
472013 Annual ACSC Conference  Cyber Security Threat Sharing: A Roadmap for Collaborative Defense  Charlie Benway

2013 Annual ACSC Conference Cyber Security Threat Sharing: A Roadmap for Collaborative Defense Charlie Benway

Add to Reading List

Source URL: www.acscenter.org

Language: English - Date: 2013-12-05 12:45:22
48EVENT BOOKLET  PARTNERS EVENT PARTNERS

EVENT BOOKLET PARTNERS EVENT PARTNERS

Add to Reading List

Source URL: cyfy.org

Language: English - Date: 2014-10-14 02:38:21
49Best International Cyber Security Practises for Critical Energy Infrastructure Protection UPDATED PROGRAMMES

Best International Cyber Security Practises for Critical Energy Infrastructure Protection UPDATED PROGRAMMES

Add to Reading List

Source URL: csuae.org

Language: English - Date: 2015-05-11 09:53:28
50Cybersecurity Strategy of the Republic of Cyprus Antonis Antoniades Office of the Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy

Cybersecurity Strategy of the Republic of Cyprus Antonis Antoniades Office of the Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:23:29