250 search results for “cyber 20security” in the Public website
-
The Hague Program for Cyber Norms
A research program that focuses on the development and implementation of cyber norms.
-
EU Cyber Diplomacy Initiative (EU Cyber Direct)
EU Cyber Direct – EU Cyber Diplomacy Initiative supports the European Union’s cyber diplomacy and international digital engagements in order to strengthen rules-based order in cyberspace and build cyber resilient societies. To that aim, we conduct research, support capacity building in partner countries,…
-
Let Them Roar: Small States as Cyber Norm Entrepreneurs
A discourse on international cyber norms has emerged ever since the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE) recommended eleven norms on responsible state behaviour in cyberspace.
-
Cyber security
To make digital communication more secure, we need to tighten up the legal frameworks and identify the biggest cyber threats.
-
The Demilitarisation of Cyber Conflict
The debate about state behaviour in cyberspace may be set in the wrong legal key.
-
Sixth edition of the European Cyber Security Perspectives
On 12 March 2019, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
-
Cyber Security
Cyber security is one of the critical challenges in our inter-connected world. Organizations are being constantly targeted by adversaries. Various critical systems become exposed on the Internet. Users can find that their data has been stolen from a company that they were not even aware of.
-
Cyber Security by Integrated Design (C-SIDe)
C-SIDe project involves a broad selection of associates in solving cybersecurity problems. Security of software systems has emerged as a critical need in our interconnected society. Companies developing software products look for Security-by-Design approaches accommodating security into their software…
-
Cyber Security Governance
The research group Cyber Security Governance will provide cutting-edge academic research in the domain of cyber, where modern technology interacts with traditional concepts such as governance, sovereignty, law-enforcement, international relations and conflict.
-
Cyber Security (MSc)
The executive master’s programme in Cyber Security of Leiden University takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Executive Master Cyber Security
The executive Master’s Programme Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Cyber Security Governance Essentials
The Leiden Institute of Advance Computer Science (LIACS) in collaboration with the Institute of Security and Global Affairs (ISGA) have developed the minor Cyber Security Governance Essentials to provide students with a mixture of technical and governance knowledge to set them on a path towards understanding…
-
Cyber Operations and International Law
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting…
-
Shades of grey: cyber intelligence and (inter)national security
This paper examines cyber intelligence in the context of national and international security.
-
Private active cyber defense and (international) cyber security—pushing the line?
This article on private active cyber defense by Dennis Broeders is part of a special issue of the Journal of Cybersecurity, based on a selection of contributions taken from the 2019 Conference on Cyber Norms organized by The Hague Program for Cyber Norms.
-
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?
This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major – and allegedly state-led – cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainian power grid 2015, the US presidential…
-
The Hague Program on International Cyber Security
Taking the changing landscape of international cyber security and cyber conflict as a point of departure, The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic changes and challenges…
-
Cyber agent technology and intelligence agencies
Cyber agent technology and intelligence agencies is a project that is commissioned by Tracks Inspector, a Dutch company that develops innovative software.
-
Cyber-noir: Cybersecurity and popular culture
New article on popular culture influences on cybersecurity experts, available Open Access at Contemporary Security Policy, part of a special issue edited by dr. Myriam Dunn Cavelty.
-
Cyber Governance and National Security: Intervening in Ungoverned Spaces
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
-
Is the Gulf Cooperation Council (GCC) Cyber Resilient?
James Shires, Assistant Professor at the Institute of Security and Global Affairs at Leiden University, co-authored this report on the GCC's cyber resilience with Joyce Hakmeh, Senior Research Fellow of Chatham House's International Security Programme.
-
Introductie webinar cyber security
Study information
-
Israel: cyber securitization as national trademark & Palestinian territory occupied: cybersecurity at reduced sovereignty
Fabio Cristiano contributed two chapters to the Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian.
-
Securing Humanitarian Operations: Preparedness and Response to Cyber Crises in Aid Delivery
How do humanitarian organisations adapt cyber incidents to their specific priorities and needs, and how can they adapt strategies of other organisations?
-
Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
In this article for Studies in Conflict & Terrorism, the authors analyse the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).
-
Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
Chapter by Fabio Cristiano and Emilio Distretti for the volume The Aesthetics and Politics of the Online Self, edited by Donatella Della Ratta, Geert Lovink, Teresa Numerico, and Peter Sarram for Palgrave Macmillan.
-
Alumni Cyber Security Academy in AD "Cyber security is hot, and not only among nerds"
Cyber security is only for socially awkward nerds? Three alumni of the Cyber Security Academy prove the opposite.
-
Rutger Leukfeldt
Faculty Governance and Global Affairs
e.r.leukfeldt@fgga.leidenuniv.nl | +31 70 800 8206
-
Unlock the cyber crisis: Developing the prototype of an escape room-style cooperative game for cybersecurity education
The project aims to develop an escape room-style game to teach students cyber crisis management and prepare them for real-world cybersecurity challenges
-
Countering cyber terrorism in a time of 'war on words': Kryptonite for the protection of digital rights?
This collection includes six short policy-focused contributions exploring how legislation and policy on counter cyber terrorism unfold at the national level in the United States, the United Kingdom, China, Russia, France, and at the regional level of the European Union.
-
Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone
Monica Kaminska, Dennis Broeders and Fabio Cristiano have contributed a chapter to the proceedings of the 13th International Conference on Cyber Conflict (CyCon 2021), which gathers 20 articles from the law, technology and strategy domains.
-
How can we increase the financial sector’s resilience to cyber attacks? Get inside the mind of a hacker!
The financial sector is an appealing target for hackers. For that reason, lawmakers and regulators are going to great lengths to make the sector more resilient to cyber attacks. One recent measure was the introduction of the Digital Operational Resilience Act (DORA). This new EU regulation is extremely…
-
Parto Mirzaei
Faculty Governance and Global Affairs
p.mirzaei@fgga.leidenuniv.nl | +31 70 800 9506
-
Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace
Jelena Vićić and Richard Harknett offer an analytical construct to better understand the mechanism by which cyber-enabled influence operations work
-
Nele Mentens
Science
n.mentens@liacs.leidenuniv.nl | +31 71 527 4799
-
Lena Riecke
Faculty Governance and Global Affairs
l.riecke@fgga.leidenuniv.nl | +31 70 800 9506
-
Voluntary, Non-Binding Norms for Responsible State Behaviour in the Use of Information and Communications Technology: A Commentary
The United Nations Office for Disarmament Affairs (UNODA) has published the 2017 issue in their Civil Society and Disarmament series, titled Voluntary, Non-Binding Norms for Responsible State Behaviour in the Use of Information and Communications Technology: A Commentary. The series aims to provide…
-
What are cyber norms?
Interview with prof.dr. Dennis Broeders in magazine De Veiligheidsdiplomaat (The Security Diplomat)
-
The unexpected norm-setters: Intelligence agencies in cyberspace
Ilina Georgieva published an article in the journal Contemporary Security Policy on the norm-setting role of intelligence agencies.
-
Max van Haastrecht
Science
m.a.n.van.haastrecht@liacs.leidenuniv.nl | +31 71 527 4799
-
Tatiana Tropina
Faculty Governance and Global Affairs
t.tropina@fgga.leidenuniv.nl | +31 70 800 9500
-
Leiden LL.M. students hand over IHL clinic report on “Cyber Warfare” to the Netherlands Red Cross
On Thursday, 17 September 2015, the latest project of the Leiden International Humanitarian Law Clinic (the IHL Clinic) on ‘Principles of International Humanitarian Law applied to Cyber Warfare’ was concluded and presented to the Netherlands Red Cross.
-
Start Second Cohort Executive Master's Programme Cyber Security
On January 14th the executive Master’s programme Cyber Security started for the second time at the HSD Campus
-
eLaw investigates cyber agent technology for secret services
Tracks Inspector, a Dutch company that develops innovative software, commissioned research to eLaw to investigate the use of cyber agent technology for intelligence agencies and secret services.
-
Blog Post | Cyber-diplomacy: A Field in Flux
Three decades ago, cyber-diplomacy did not exist. The interest in Information and Communication Technology (ICT) as a vector of change in international relations was limited to a few mostly technical organisations, and a restricted number of states.
-
Presentation at Korea-Netherlands Cyber Dialogue in Seoul
On 12 April, GTGC's chair, Prof. Jan Aart Scholte, took part in, and presented at, the Korea-Netherlands Cyber Dialogue in Seoul, South Korea.
-
Foreign intelligence in the digital age. Navigating a state of 'unpeace'.
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its first policy brief, in which Dennis Broeders, Sergei Boeke and Ilina Georgieva explore the role of intelligence agencies in cyberspace and the (im)possibilities of oversight and regulation…
-
Data Breaches and Effective Crisis Communication: A Comparative Analysis of Corporate Reputational Crises
Online data breaches are recurrent and damaging cyber incidents fors organizations worldwide. This study examines how organizations can effectively mitigate reputational damages in the aftermath of data breaches by hacking, through situational crisis communication strategies.
-
Freedom AND Security - Conference Report Published by Europol
On 22 November 2018, Els De Busser spoke at a panel during the conference
-
Gender equality, cybersecurity, and security sector governance
In this article, James Shires and Tatiana Tropina, assistant professors at the Institute of Security and Global Affairs, map the relationship between gender equality and cybersecurity governance as a component of good security sector governance (SSG). Here, it highlights the way in which cybersecurity…