Cyber Crisis: Foundations of Multi-Stakeholder Coordination

September 17, 2019

In this guide, we lay the foundations for multi-stakeholder coordination during cybersecurity crises that can undermine the security of the digital economy. This guide draws on the diverse international perspectives of CSDE members, as well as their leading practices and realworld actions, to increase incident response readiness, capabilities, and cooperation during catastrophic, crisislevel incidents that call for mobilization of the Information and Communications Technology (ICT) sector.

Spotlight

CyberCore Technologies

CyberCore Technologies maintains a global presence through our locally owned and operated organizations. We support the Department of Defense (DoD) in many long-term engagements throughout DoD, IC, DHS and commercial organizations for planning and successfully implementing technology projects.

OTHER WHITEPAPERS
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

The Veritas Ransomware Resiliency Strategy

whitePaper | January 19, 2023

The threat of ransomware attacks is a top concern for businesses of all types and sizes. Ransomware attacks have become commonplace with cybercriminals continuously evolving and creating new, more sophisticated ways to deliver attacks. With demands becoming excessive and the risk of data loss increasing, an advanced multi-layered resiliency strategy is needed to help ensure that your IT services are secure, resilient, and recoverable while providing the smooth user experience that your end users expect.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

Analyzing the Economic and Operational Benefits of theDell Data Protection Portfolio

whitePaper | November 29, 2022

We live in an intensely data-driven world, where data loss is unacceptable and quick access to information with real-time analytics driven by machine learning and artificial intelligence is at the core of decision making. Effective data protection is a critical component of every successful business. Now, more than ever, organizations are looking at their data protection strategies through a new lens. They are evaluating old practices, with a focus on making data protection a hands-off, efficient solution they can rely on without applying extensive IT resources. This can be accomplished through standardizing on a vendor with a comprehensive data protection offering, single management capabilities, and support across a diverse network of systems on-premises, in public and private data centers, in multiple clouds, and in remote office/branch offices (ROBO) and edge environments.

Read More

Spotlight

CyberCore Technologies

CyberCore Technologies maintains a global presence through our locally owned and operated organizations. We support the Department of Defense (DoD) in many long-term engagements throughout DoD, IC, DHS and commercial organizations for planning and successfully implementing technology projects.

Events