Accessibility

Last draft saved at:

New call for action

After submitting your new call for action, the EU CyberNet team will review it before approving. They have the right to decline the call for action if it does not fit the platform. Reviewing process may take up to 5 working days.

  • 1

    Required skills & Competences

  • 2

    Potential experts

  • 3

    General details

  • 4

    Contact

Let's get started

Field is required
invalid format
Field is required

Skillsets (up to 5)

The skillset represents requested area of expertise; when you select one, a pop-up window will help you to further understand the core of the skillset and specify your needs through skills.
You can choose up to 5 skillsets and up to 10 skills for each of them.

Add a skillset: Applied Cryptography

Please add specific skills relevant to you

Available skills:
A blockchain is a type of distributed ledger technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography. (Wikipedia).
An encryption algorithm is designed to encode a message or information so that only authorized parties can access data, and data is unreadable by unintended parties. There are two types of Encryption Algorithm like the Symmetric-key algorithm, also known as a secret key algorithm, and the Asymmetric key algorithm also called a public key algorithm.
Implementations of encryption in IT systems use various algorithms and protocols (e.g. symetric and asymetric, RSA, Diffie-Hellman, DES, TripleDES, AES, etc). To understand their vulnerabilities, it is important to understand its functioning by analysing it.
Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. It involves the use of a public key infrastructure (PKI); a set of roles, policies, and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Applied Cryptography describes the development, implementation, and use of cryptographic techniques.

Add a skillset: Automated bot malware mitigation

Please add specific skills relevant to you

Available skills:
Bot mitigation is the reduction of risk to infrastructure and services from malicious bot traffic that fuels common automated attacks, such as, DDoS campaigns and vulnerability probing. The mitigation activities may pursue malicious bot identification and blocking, command and control infrastructure identification, botnet sinkholing, infiltration and monitoring, and infrastructure takedown.
Malicious code analysis is the process of understanding the behavior and purpose of a suspicious code, to aid the detection and mitigation of the potential threat.
Indicators of compromise serve as forensic evidence of potential intrusions on a host system or network, to allow the detection of intrusion attempts or other malicious activities, analysis of particular malware's techniques and behaviors, and provide actionable threat intelligence.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Botnet is a network of hijacked network devices infected by the use of automated malware, which are under the control of an attacking party used to carry out various scams and cyberattacks. Mitigation of such networks focuses on malware analysis, command-and-control structure analysis, and coordinated mitigation activities.

Add a skillset: Cloud Security & Compliance

Please add specific skills relevant to you

Available skills:
A cloud infrastructure assessment tests and analyzes cloud infrastructure to ensure the organization is protected from various security risks and threats on the cloud.
Cloud services refer to a wide range of services delivered on demand to customers over the internet. These services are designed to provide easy access to applications and resources, without the need for internal infrastructure or hardware. Some of the well-known cloud service providers include, such as, Amazon Web Services, Microsoft Azure, and Google Cloud.
Web application security refers to a variety of processes, technologies, or methods, including development security practices, for protecting web servers, web applications, and web services from attack by Internet-based threats. Web application security is crucial to protecting data, customers, and organizations from data theft, interruptions in business continuity, or other harmful results of cybercrime.
Cloud penetration testing is an authorised simulated cyber-attack against a system that is hosted on a cloud provider with the main goal of finding the weaknesses and strengths of a system, so that its security posture can be accurately assessed.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Cloud security is a collection of procedures and technology used to control the security, compliance, and usage risks of cloud computing to address external and internal threats. This responsibility is shared between the cloud provider and the customer.

Add a skillset: Computer security incident response

Please add specific skills relevant to you

Available skills:
Incident handling prcatices include the phases of the incident handling workflows. The major phases are dection and reporting, identification, classification and priorisation (triage), and incident handling acticvities as documenting (ticket), analysis, problem solving, reporting and mitigation.
Incident handling is based on many workflows. In the different phases, they include technical and organisational skills. The techniques to handle an computer security incident must be planned and prepared ahead of the occurance but must be flexible to be able to react on every sitaution with the respective means.
Incident response policies have been devolped and introduced since the 1980s. Methodolgies and frameworks can be used by organisations to implement their incident response processes. (e.g., CSIRT services framework, NIST NICE, MITRE, CERT/CC).
In incident response, it is important to share and exchange information related to incidents, vulnerabilities, and attack vectors between trusted partners. Organisational and technical information exchange solutions and protocols include e.g. MISP, TLP, etc.
A SOC is a team primarly composed of security analysts organizsd to detect, analyze, respond to, report on, and prevent cyber security incidents. SOC are organised in different ways, according to their host organisation, constituency, and tasks. It can include e.g. monitoring, detection, incident handling, and prevention.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Computer security incident response is planned and organized approach to addressing and managing the aftermath of a security breach or cyberattack (IT incident, computer incident or security incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.

Add a skillset: Critical Information Infrastructure Protection (CIIP)

Please add specific skills relevant to you

Available skills:
All-hazards approach is a concept used in NIS 2 Directive to refer to a set of minimum cybersecurity risk-management measures which aim to protect network and information systems and the physical environment of those systems from incidents.
Capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident.
Critical Infrastructure (CI) and Critical Information Infrastructure (CII) sectors encompass essential systems and assets—such as energy, finance, healthcare, transportation, water, and telecommunications—whose disruption would severely impact national security, economic stability, public health, and safety.
Identifying and classifying critical information infrastructure is an essential step in effective CII risk management. In this step, governments/stakeholders conduct an open dialogue about criticality; that is determine which information infrastructure elements, critical functions, and key resources are needed to deliver essential government services, ensure orderly functioning of the economy, and provide public safety.
Any weakness within a network and information system that can be exploited.
Cyber Physical System (CPS) is a decentralized network of devices, applications, and services that can sense, log, interpret, communicate, process, and act on a variety of information or control devices in the physical environment.
The energy sector, vital for the production, transmission, and distribution of electricity, oil, and natural gas, requires robust cybersecurity measures to protect against disruptions and attacks on critical infrastructure.
The finance sector, including banking, investments, and insurance, relies on advanced cybersecurity to secure financial transactions, protect sensitive information, and maintain economic stability.
The healthcare sector, consisting of medical services, hospitals, and pharmaceutical production, necessitates stringent cybersecurity to protect patient data, ensure the integrity of medical devices, and safeguard public health operations.
Assessment of consequences of decision, e.g. in the context of a cyber security incident on the reputation, business processes or security posture etc.
Any weakness in hosting environment of network and information system, that can enable a physical attack on the system.
Process to identify potential threats and impacts.
The space sector, encompassing satellite communications, space exploration, and earth monitoring, depends on strong cybersecurity to safeguard data integrity and prevent malicious activities that could compromise national security and essential services.
The telecom sector, enabling telecommunication via internet, telephone, and broadcasting, demands robust cybersecurity to maintain connectivity, protect information exchange, and defend against cyber threats.
The transportation sector, covering the movement of people and goods via roads, railways, airways, and waterways, requires comprehensive cybersecurity to prevent disruptions and ensure the safety and reliability of transportation networks.
The water sector, responsible for sourcing, treating, and distributing potable water, as well as managing wastewater systems, relies on cybersecurity to protect water quality, ensure the continuity of services, and guard against infrastructure attacks.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Protection of the digital security of critical activities and dependent systems.

Add a skillset: Cyber Awareness

Please add specific skills relevant to you

Available skills:
Cyber awareness among population is the foundation of ensuring cyber security. Here also: Awareness raising and training activities related to cybercrime legal aspects and/or targeting legal professionals.
To convey information and knowledge to users and managers on technology and its security aspects for better understanding.
Straegy to set out the goals for communication and means of reaching these objectives.
Proactive approach to mitigate risks.
The practice of managing and disseminating information from an individual or an organization (such as a business, government agency, or a nonprofit organization) to the public in order to affect their public perception.
Target audience analysis involves describing your audience in terms of a variety of demographics, including age and gender, as well as income, education, and location, or psychographics like interests and opinions.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Development and implementation of awareness programms to enhance the level of conciousness on cyber threats and rules and regulations. Enable users to understand necessary security measures.

Add a skillset: Cyber Crime – International

Please add specific skills relevant to you

Available skills:
This Protocol entails an extension of the Cybercrime Convention’s scope, including its substantive, procedural and international cooperation provisions, so as to cover also offences of racist or xenophobic propaganda.
Second Additional Protocol to the Convention on Cybercrime on enhanced co-operation and disclosure of electronic evidence.
Council of Europe Convention on Cybercrime (CETS 185). Budapest Convention was adopted in 2001 by the Council of Europe and is the only international agreement between states specifically focused on cyber crime.
The ePrivacy Regulation aims to simplify the rules regarding cookies and streamline cookie consent in a more 'user-friendly' way.
Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JHA.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

International/supranational legal instruments addressing various aspects of fight against cybecrime.

Add a skillset: Cyber Crime – National

Please add specific skills relevant to you

Available skills:
Cyber awareness among population is the foundation of ensuring cyber security. Here also: Awareness raising and training activities related to cybercrime legal aspects and/or targeting legal professionals.
A collective term for the different systems of cooperation between (law enforcement) authorities in different countries.
Cooperation with non-state actors in prevention, investigation and mitigation of cybercrime.
Scientific and technical knowledge on issues of fact at the court's disposal.
National level substantive laws related to cybercrimes.
Laws concerning the processes of cybercrime investigations and/or investigations online.
A proactive approach to fight cybercrime ex ante.
Notification procedure to authorities about the fact that a cybercrime may have been committed.
Cybercrime Units (CCU) primary role is to provide technical assistance in the detection and investigations of crime wherein the computer is the target or the means used.
Information in electronic/digital format with (potential) evidentiary value. Also electronically stored information (ESI) may be used interchangeably with the term electronic evidence. Also 'digital evidence' is used freqently.
The process of policy coordination between states to pursue a common goal or interest. Here also: Local implementation of and engagement in international cooperation regarding combat against cybercrime.
Here: National courts and other judicial authorities exercising judicial powers or functions relating to cybercrimes.
Here: Activities of various national public authorities to prevent, investigate and detect cyberimes.
Here: Activities of national public authorities to prosecute cyberimes.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

National legal instruments and mechanisms addressing various aspects of fight against cybercrime.

Add a skillset: Cyber Crisis Management

Please add specific skills relevant to you

Available skills:
Civil-Military Co-operation is the means by which a military commander connects with civilian agencies active in a theatre of operations. It can also refer to a wider concept of cooperation between military and civilian bodies.
The Comprehensive Approach is about developing mechanisms and cultures of understanding, sharing and collaboration, both vertically between nations and international organisations, and horizontally between nations and between organisations. It can also refer to a holistic approach to e.g. writing a domestic cyber security strategy and engaging all stakeholders from different levels.
Cyber Defense consists of solutions that actively resist attack. Capabilities refer to the ability to resist attacks and doctrines reflext how military forces contribute to campaigns, major operations, battles, and engagements.
Cybersecurity management is an area of information technology that organizations and businesses use to protect and secure sensitive information from cybercriminals or any unwanted guests.
Understanding the cyber environment and accurately predicting and responding to potential problems that might occur in cyberspace. Cyber situational awareness is the capability that helps security analysts and decision makers: Visualize and understand the current state of the IT infrastructure, as well as the defensive posture of the IT environment. Identify what infrastructure components are important to complete key functions.
The concept of Cybersecurity Reserves involves creating volunteer workforces to assist with cybersecurity risk management and incident response. These reserves, often composed of experts in relevant areas, support government agencies and organisations in addressing cyber threats. The concept of Cybersecurity Reserve aims to mitigate the shortage of skilled cybersecurity professionals and strengthen overall cyber defences.
Law that applies within a state.
Proactive approach to mitigate risks.
The practice of managing and disseminating information from an individual or an organization (such as a business, government agency, or a nonprofit organization) to the public in order to affect their public perception.
A Threat Assessment is a process for evaluating and verifying perceived threats, including assessing their likelihood. In cybersecurity, a threat assessment is usually performed by security risk management and it precedes plans for mitigating threats against the enterprise.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Set of procedures designed for handling a cyber crises, preferrably formally outlined by domestic frameworks.

Add a skillset: Cyber Diplomacy

Please add specific skills relevant to you

Available skills:
Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
The Council of Europe's framework focuses on ensuring AI systems comply with internationally recognised standards for human rights, democracy, and the rule of law. However, both the EU and the Council of Europe are considering excluding AI systems intended for military use, national defence, and national security from their final regulatory frameworks.
The Council of Europe is the continent's leading human rights organisation. It includes 47 member states, 27 of which are members of the European Union.
Confidence-building measures (CBMs) are planned procedures to prevent hostilities, to avert escalation, to reduce military tension, and to build mutual trust between countries.
The use of diplomatic tools and initiatives to achieve a state's national interest in cyberspace. Referring to the EU initiative with the same name. Draft Council Conclusions on a Framework for a Joint EU Diplomatic Response to Malicious Cyber Activities ("Cyber Diplomacy Toolbox") of 6 June 2017.
Norms of responsible state behaviour are voluntary legally non-binding agreements between states, originally agreed upon in the 2015 UN GGE report, and later adopted by the UN GA.
Economic and financial measures intended to change the behavior of perpetrators who have carried out malicious cyber activities and/or intrusions.
For discussing cybersecurity in the context of international peace and security.
The European Union (EU) is a political and economic union of 27 member states that are located primarily in Europe.
The Organization for Security and Co-operation in Europe (OSCE) is the world's largest security-oriented intergovernmental organization.
The United Nations (UN) is an intergovernmental organization aiming to maintain international peace and security, develop friendly relations among nations, achieve international cooperation, and be a centre for harmonizing the actions of nations.
United Nations Group of Governmental Experts (UN GGE) on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security is a format for a set number (15-25) of UN Member States, aimed at resulting in a consensus report.
United Nations Open-Ended Working Group (OEWG) on Developments in the Field of Information and Telecommunications in the Context of International Security is an open format for all UN Member States, aimed at resulting in a consensus report.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

The use of diplomatic tools and initiatives to achieve a state’s national interest in cyberspace.

Add a skillset: Cyber Policy

Please add specific skills relevant to you

Available skills:
The EU policy response outlining EU's common approach to adopting 5G technologies.
Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
Consists of the European Cybersecurity Competence Centre (ECCC), National Coordination Centres and the Cybersecurity Competence Community. The goal of the network is to help the EU retain and develop cybersecurity technological and industrial capacities.
The use of diplomatic tools and initiatives to achieve a state's national interest in cyberspace.
Norms of responsible state behaviour are voluntary legally non-binding agreements between states, originally agreed upon in the 2015 UN GGE report, and later adopted by the UN GA.
Economic and financial measures intended to change the behavior of perpetrators who have carried out malicious cyber activities and/or intrusions.
The system of strategic documents of the EU addressing cyber-related issues.
Best practices, tools and methods for effective dissemination of information to the desired audience.
The Joint Cyber Unit is a new platform that aims to strengthen cooperation among EU Institutions, Agencies, Bodies and the authorities in the Member States, proposed under COMMISSION RECOMMENDATION of 23.6.2021 on building a Joint Cyber Unit.
A national cybersecurity strategy (NCSS) is a plan of actions designed to improve the security and resilience of national infrastructures and services. It is a high-level top-down approach to cybersecurity that establishes a range of national objectives and priorities that should be achieved in a specific timeframe. (ENISA).
National or EU policies and practices relating to vulnerability disclosure.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Set of policies to achieve national or EU interests in cyberspace, intertwined with legal and strategic aspects. Skills may overlap to some extent with the EU legal domains and Cyber Diplomacy skillsets.

Add a skillset: Cyber Threat Intelligence

Please add specific skills relevant to you

Available skills:
The employment of cyber capabilities to acieve objectives in or through cyberspace (Tallinn Manual definition).
Risk mapping is a technique used to detect cyber risks.
Process of inspecting, cleansing, transforming, and modelling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.
Statistical measure that expresses the extent to which two variables are linearly related.
Process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
Best practices, tools and methods for effective dissemination of information to the desired audience.
Proactive approach to mitigate risks.
Strategic reporting refers to a complex process of collecting the data about an organization's performance and the analysis of this data. Addressing progress, outcomes and performance with respect to specific goals.
A Threat Assessment is a process for evaluating and verifying perceived threats, including assessing their likelihood. In cybersecurity, a threat assessment is usually performed by security risk management and it precedes plans for mitigating threats against the enterprise.
Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Understanding the cyber threats facing an organization or nation.

Add a skillset: Cyber and Information Risk Management

Please add specific skills relevant to you

Available skills:
A vulnerability is a weakness in an asset or group of assets. An asset's weakness could allow it to be exploited and harmed by one or more threats. (ISO 27001 definitions).
Risk mapping is a technique used to detect cyber risks.
Understanding the cyber environment and accurately predicting and responding to potential problems that might occur in cyberspace. Cyber situational awareness is the capability that helps security analysts and decision makers: Visualize and understand the current state of the IT infrastructure, as well as the defensive posture of the IT environment. Identify what infrastructure components are important to complete key functions.
Knowledge, skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace.
Job responsibilities refer to the duties and tasks of their particular roles. This is sometimes referred to as the job description. Roles, however, refer to a person's position on a team. In Cybersecurity, the ere are technical, organisational, managerial, administrative, and governance roles.
Policies, procedures, and processes to manage and monitor the organization's regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk. Governance and risk management processes address cybersecurity risks (NIST Cybersecurity Framework).
Organisations should have their specific cybersecurity policy as basis for security measures.
A Threat Assessment is a process for evaluating and verifying perceived threats, including assessing their likelihood. In cybersecurity, a threat assessment is usually performed by security risk management and it precedes plans for mitigating threats against the enterprise.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Risk management is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.

Add a skillset: Cyber-Physical Systems and Industrial Control Systems

Please add specific skills relevant to you

Available skills:
Critical information infrastructure protection is a set of activities aimed at ensuring the functionality, continuity and integrity of country's essential information and communication systems to deter, mitigate and neutralise a threat, risk or vulnerability or minimise the impact of an incident.
Cyber Physical System (CPS) is a decentralized network of devices, applications, and services that can sense, log, interpret, communicate, process, and act on a variety of information or control devices in the physical environment.
Operational technology is the use of hardware and software to monitor and control physical processes, devices, and infrastructure across a large range of asset-intensive sectors and industries, performing a wide variety of automation tasks.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Cyber-Physical system is a decentralized network of devices, applications, and services that can sense, log, interpret, communicate, process, and act on a variety of information or control devices in the physical environment. Industrial Automation and Control Systems refers to the collection of personnel, instrumentation, hardware, and software that can affect or influence the safe, secure, and reliable operation and automation of an industrial process.

Add a skillset: Cybersecurity economics

Please add specific skills relevant to you

Available skills:
Business impact analysis is a tool to help plan for the inevitability of consequences and their cost. (projectmanager.com).
A risk management technique where selected cyber risks are transferred to the insurance provider in exchange for a fee. Cyber insurance should be used in concert with other risk management techniques.
Use of theories, approaches, methods and tools of economic disciplines emphasizing the impact of security threats at the macroeconomic and microeconomic level. (cyber)security relevant studies in economics, tackling problems like cyber insurance and business impact analysis.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Cybersecurity-relevant studies in economics.

Add a skillset: Cybersecurity education & training

Please add specific skills relevant to you

Available skills:
The process of creating and systematically improving courses or study programmes. Identification of the "mission" of a training, and the knowledge and skills that the training expects successful students to acquire. Definition of training objectives and preparation of training content.
Competences in assessing the level of skill or knowledge of the training audience, for example via standardised testing, technical challenges, etc. For the development of cybersecurity training, it is important to assess the training objectives according to knowledge, skills, and abilities (KSA) needed for a Cyber security role or function.
Ways to enable learning of the desired skill or knowledge, usually under the direction of a teacher or instructor.
Competences in creating or updating study aids, challenges, tests (etc.) that facilitate learning.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Cybersecurity-relevant education and training programs and solutions.

Add a skillset: Cybersecurity exercises

Please add specific skills relevant to you

Available skills:
Set of procedures designed for handling a cyber crises, preferrably formally outlined by domestic frameworks. Readiness, response and recovery from cyber incident.
Decision-making procedures in cyber security situations. Knowledge of policies, proccesses and procedures is important.
Exercises are used to train skills, evaluate processes and procedures, and certify teams on the maturity in their task. Even in non-technical exercises nowadays, cyber elements need to be trained, as all processes and procdures in complex environments are dependent on IT and cyber processes.
Cyber hygiene, or cybersecurity hygiene, is a set of practices organizations and individuals perform regularly to maintain the health and security of users, devices, networks and data.
A cyber range is a controlled, interactive technology environment where IT architectures and systems run in virtual and scalable environment. In a cyber range all possible scenarios and attacks on IT infrastructure, networks, software platforms and applications can be simulated.
Risk mapping is a technique used to detect cyber risks.
Understanding the cyber environment and accurately predicting and responding to potential problems that might occur in cyberspace. Cyber situational awareness is the capability that helps security analysts and decision makers: Visualize and understand the current state of the IT infrastructure, as well as the defensive posture of the IT environment. Identify what infrastructure components are important to complete key functions.
Process to design, draft and prepare an exercise.
Cyber exercises are conducted in various types: e. g. Table-top exercise, Capture-the flag, Red-blue-team exercise, simulation, etc.
Arrangement between private and public entities.
The process of creating and maintaining the storyline, background events, personas (etc.) that make up the exercise scenario. Scenario development for Cybersecurity exercises should support the training objectives and processes to be trained. The scenarios should allow measurable results.
Joint activities performed by diverse ministries, public administrations and public agencies in order to provide a common solution to particular problems or issues.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Cybersecurity exercises for training, experimentation, skill & readiness assessment.

Add a skillset: Cybersecurity management

Please add specific skills relevant to you

Available skills:
Capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident.
A tool used to understand the value derived from proposed activity, acquisition or investment.
A form of training modeling and testing preparedness of an organisation' preparedness for various cyber incidents.
Assessment of consequences of decision, e.g. in the context of a cyber security incident on the reputation, business processes or security posture etc.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Managerial-level cybersecurity issues are concerned by the leadership of organization. Executive cybersecurity issues are those which may interfere with the organizational goals, strategic planning development and overall decision making in the organization.

Add a skillset: Data Protection

Please add specific skills relevant to you

Available skills:
Retention of traffic and location data for the purpose of preventing, investigating, detecting or prosecuting crimes and safeguarding natinal security.
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector.
General Data Protection Regulation 2016/679.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Set of processes to regulate the processing of data and to prevent misuse of data.

Add a skillset: Digital Forensics

Please add specific skills relevant to you

Available skills:
A process that tracks the movement of evidence through its collection, safeguarding, and analysis lifecycle by documenting each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer.
Forensic digital analysis is the in-depth analysis and examination of electronically stored data and artefacts, with the purpose of identifying information that may support or contest matters in an investigation or court proceeding.
Data acquisition in digital forensics encompasses all the procedures involved in gathering digital evidence including cloning and copying evidence from any electronic source.
Internet service investigation is the process of identifying, accessing, collecting and surveiling the use of internet-based and cloud services in the context of digital forensic investigation.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Digital forensics is the application of computer science and investigative procedures involving the acquisition and examination of digital evidence – following proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possibly expert testimony.

Add a skillset: Digital Identity & Trust Services

Please add specific skills relevant to you

Available skills:
Advanced authentication mechanisms like multi factor authentication, single-sign-on, or zero trust authentication support the secure use of IT-systems, networks and applications.
A digital identity is information on an entity used by computer systems to represent an external agent. That agent may be a person, organization, application, or device. ISO/IEC 24760-1 defines identity as "set of attributes related to an entity". The selection of a particular biometric for use in a specific application involves a weighting of several factors, e.g. for use in biometric authentication.
A compliance audit is a series of checks performed externally to make sure that the digital identity services and certificates are meeting the regulatory standards.
Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Electronic identification and trust services can be used by citizens, businesses and public administrations, to access online services or manage electronic transactions.

Add a skillset: EU legal domains

Please add specific skills relevant to you

Available skills:
The AI Act is a proposed European regulation on artificial intelligence (AI), marking the first comprehensive AI regulation by a major global authority. The Act categorises AI applications into three risk levels. First, applications that pose an unacceptable risk, like government-run social scoring similar to China's system, are banned. Second, high-risk applications, such as CV-scanning tools that rank job applicants, must comply with specific legal requirements. Lastly, applications not explicitly banned or classified as high-risk are mostly left unregulated.
Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020, the Cyber Resilience Act, complements European cybersecurity rules and strengthens the security of the whole supply chain with harmonised rules for placing connected hardware and software on the market, and duty of care for the whole life cycle of products.
Economic and financial measures intended to change the behavior of perpetrators who have carried out malicious cyber activities and/or intrusions.
Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act).
Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL laying down measures to strengthen solidarity and capacities in the Union to detect, prepare for and respond to cybersecurity threats and incidents, the Cyber Solidarity Act, aims to enhance incident response and recovery across the EU. It supports existing EU cyber legislation while expanding principles like information sharing between public and private sectors, situational awareness, Incident response and recovery, crisis management frameworks, and cybersecurity operational cooperation.
Regulation (EU) 2022/2554 is a sector-specific EU legal act aimed at achieving high common level of digital operational resilience of financial institutions (Financial Information Service Providers).
Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on a Single Market For Digital Services (Digital Services Act) and amending Directive 2000/31/EC COM/2020/825 final. The Digital Services Act and Digital Markets Act aim to create a safer digital space where the fundamental rights of users are protected and to establish a level playing field for businesses.
Directive (EU) 2018/1972 of the European Parliament and of the Council of 11 December 2018 establishing the European Electronic Communications Code (Recast). This directive established a harmonised framework for the regulation of electronic communications networks, electronic communications services, associated facilities and associated services, and certain aspects of terminal equipment.
Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC.
Information in electronic/digital format with (potential) evidentiary value. Also electronically stored information (ESI) may be used interchangeably with the term electronic evidence. Also 'digital evidence' is used freqently.
The ePrivacy Regulation aims to simplify the rules regarding cookies and streamline cookie consent in a more 'user-friendly' way.
Legal aspects related to activities falling within the scope of the Cyber Defence Policy Framework of the EU.
Including, but not limited to: COMMISSION RECOMMENDATION (EU) 2017/1584 of 13 September 2017 on coordinated response to large-scale cybersecurity incidents and crises; COUNCIL IMPLEMENTING DECISION (EU) 2018/1993 of 11 December 2018 on the EU Integrated Political Crisis Response Arrangements; COMMISSION RECOMMENDATION of 23.6.2021 on building a Joint Cyber Unit.
General Data Protection Regulation 2016/679.
Here: legal protection of human rights relevant in the context of cyberspace, including the right to privacy, freedom of thought and conscience, freedom of expression, and guarantee of due process.
Legal tools for the sharing of information between national authorities (e.g. national CSIRT/CERT) and also law enforcement authorities.
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Network and Information Security Directive provides legal measures to boost the overall level of cybersecurity in the EU.
Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive). Appropriate and proportionate technical, operational and organisational measures to be taken by essential and important entities to manage the risks posed to the security of network and information systems, and to prevent or minimise the impact of incidents on recipients of their services and on other services.
Directive (EU) 2015/2366 of the European Parliament and of the Council of 25 November 2015 on payment services in the internal market, amending Directives 2002/65/EC, 2009/110/EC and 2013/36/EU and Regulation (EU) No 1093/2010, and repealing Directive 2007/64/EC.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Different EU legal domains, including regulations and directives related to cyber security.

Add a skillset: Exploit and Malware Analysis

Please add specific skills relevant to you

Available skills:
Memory exploit mitigation is a set of mitigation techniques at various levels, such as, computer firmware, operating system, compiler, and run-time envrionment to mitigate risk of memory corruption attempts.
Malware reverse engineering is a process of studying the functions and information flow of a malicious code to understand the functionality, behavior, potential impact, and crate tools for mitigation.
Memory exploitation is a set of techniques allowing the identification of vulnerabilities or security flaws and circumvention of memory exploitation protection safe-guards to permit an arbitrary code delivery, injection and execution.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Memory corruption exploit development is a process, which identifies and produces a code to take advantage of a software vulnerability or security flaw allowing an unsanctioned targeted or automated activity execution against a vulnerable system through the use of exploit code or malware. Malware analysis is the process of analyzing the behavior and purpose of the exploit code to aid in the detection and mitigation of the potential threat.

Add a skillset: General IT Systems Security

Please add specific skills relevant to you

Available skills:
Active Cyber Defence (ACD) seeks to reduce the harm from commodity cyber attacks by providing tools and services that protect from a range of attacks.
Is a multi-tiered risk-management-based approach towards information system design and secure administration from the perspecives of management device trust, administrative interface protection, administrative role management, and auditing of administrative activities.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

IT systems security is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

Add a skillset: IT Security Assessment

Please add specific skills relevant to you

Available skills:
A network assessment is a type of audit that involves using a process or script to scan a network to uncover any risks or anomalies.
Security analysis is the process to find, define, and rate the threats and vulnerabilities in an IT system or network.
A security audit is the high-level description of the many ways organizations can test and assess their overall security posture, including cybersecurity.
Regular review of security measures and controls in an IT system or network.
process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

The goal of a IT security assessment, is to ensure that necessary security controls are integrated into the design and implementation of an IT project. A properly completed security assessment should provide documentation outlining any security gaps between a project design and approved corporate security policies.

Add a skillset: Incident Management

Please add specific skills relevant to you

Available skills:
Services that are vital in helping constituents during an attack or incident. (FIRST CSIRT Services Framework 2.1.0).
Organisational structure or setup of an CSIRT, including processes e.g IR lifecycle (detect - triage - analyze - respond).
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Process to handle life cycle of an incident: detect and identify; triage and analyze; resolve, including prevent reoccurrence.

Add a skillset: Information Operations

Please add specific skills relevant to you

Available skills:
Integrated operations ((IO) refers to the integration of people, disciplines, organizations, work processes and information and communication technology to make smarter decisions.).
Respectively: unintentional dissemination of inaccurate or misleading information; deliberate creation and spread of false or misleading content; or sharing factual information out of context to harm or deceive. These can include false news, or it can involve more subtle methods such as false flag operations, feeding inaccurate quotes or stories to innocent intermediaries, or knowingly amplifying biased or misleading information. Those terms, more common in US, are often used in parallel in Europe with notions such as Propaganda or Foreign Information Manipulation and Interference (FIMI).
Synthetic identity theft is a type of fraud in which a criminal combines real and fake information to create a new identity. The real information used in this fraud is usually stolen.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Information operations includes the collection of tactical information about an adversary as well as the dissemination of propaganda in pursuit of a competitive advantage over an opponent. It may be part of hybrid warfare.

Add a skillset: Information Security Standards

Please add specific skills relevant to you

Available skills:
Certification is the formal attestation or confirmation of certain characteristics of an object, person, or organization.
Experience of governing Critical Information Infrastructure Protection (CIIP) from public authority perspective.
Formerly the SANS Critical Security Controls (SANS Top 20).
Framework to help organisations meet business cahllenges in regulatory compliance, risk management and aligning IT strategy with organisational goals.
Experience regarding drafting standards or in standardization.
Experience regarding implementing standards.
Information Technology Infrastructure Library ITIL) is set of detailed practices for IT service management and IT asset management.
Information security standards published Jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).
Guidelines on managing risk faced by organizations.
German baseline protection system.
Information security standards which compliance has been made mandatory by e. g. national law, international law.
Experience regarding supervision over implementation of standards.
Volnutary guidelines set out to establish a common language and improve security of information technology.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Published specification that establishes a common language. Goal of a information security standard is to improve the security of information technology.

Add a skillset: International Cooperation Frameworks

Please add specific skills relevant to you

Available skills:
The African Network Information Centre (AFRINIC) is the regional internet registry for Africa.
American Registry for Internet Numbers (ARIN) is the regional Internet registry for Canada, United States and many Caribbean and North Atlantic islands.
The Asia Pacific Network Information Centre (APNIC) is the regional Internet registry for Asia-Pacific.
24/7 Network under Art 35 of the Budapest Convention.
The CSIRTs Network is a network where members can cooperate, exchange information and build trust. Members are able to improve the handling of cross-border incidents and discuss how to respond in a coordinated manner to specific incidents. The CSIRTs Network is composed of CSIRTs appointed by EU Member States and CERT-EU.
Consists of the European Cybersecurity Competence Centre (ECCC), National Coordination Centres and the Cybersecurity Competence Community. The goal of the network is to help the EU retain and develop cybersecurity technological and industrial capacities.
The European cyber crisis liaison organisation network (EU-CyCLONe), is a cooperation network for Member States national authorities in charge of cyber crisis management. The aim is to collaborate and develop timely information sharing and situational awareness based on tools and support provided by the EU Agency for Cybersecurity, which serves as the CyCLONe Secretariat.
EU agency for judicial cooperation in criminal matters.
European Union Agency for Law Enforcement Cooperation (EUROPOL) is law enforcement agency of EU; deals with serious international organised crime, including cybercrime and terrorism.
The Forum of Incident Response and Security Teams (FIRST) is a global forum of incident response and security teams.
The Internet Corporation for Assigned Names and Numbers (ICANN) is a US-based not-for-profit public-benefit corporation whose role is to coordinate, at the overall level, the global Internet's systems of unique identifiers, and to ensure the stable and secure operation of these systems.
Latin America and Caribbean Network Information Centre (LACNIC) is the regional Internet registry for Larin America and the Caribbean.
Réseaux IP Européens Network Coordination Centre (RIPE NCC) is the regional Internet registry for Europe, Middle East and parts of Central Asia.
International Criminal Police Organization (INTERPOL) is inter-governmental organization for law enforcement collaboration, including information sharing and investigative support.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Cross-border arrangements and agreements by states and other entities to adjust their behaviour to the actual preferences in pursuit of cybersecurity.

Add a skillset: International Law Applicable in Cyberspace

Please add specific skills relevant to you

Available skills:
An armed conflict arises whenever there is fighting between States or protracted armed violence between government authorities and organized armed groups or just between organized armed groups.
Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
Cyber conflict is the use of cyber attacks, causing comparable harm to actual warfare and/or disrupting vital computer systems.
Cyber espionage is the malicious theft of data, information or intellectual property from computer systems for political, military or economic purposes.
Norms of responsible state behaviour are voluntary legally non-binding agreements between states, originally agreed upon in the 2015 UN GGE report, and later adopted by the UN GA.
The employment of cyber capabilities to acieve objectives in or through cyberspace (Tallinn Manual definition).
Economic and financial measures intended to change the behavior of perpetrators who have carried out malicious cyber activities and/or intrusions.
International Humanitarian Law (IHL) is a set of rules that seek to limit the effects of armed conflict.
Surveillance technology refers to products or services used to monitor behaviour, activities or information for purposes such as information gathering, influencing, managing, or directing individuals or groups. These technologies can be lawfully and legitimately used with appropriate safeguards; however, they can also be misused by governments. Responsible use of surveillance technologies aims to enhance safety and security while respecting the rule of law and preventing harmful consequences.
An academic effort in compiling an overview of the the current status of the interpretation of international law in cyberspace.
United Nations Group of Governmental Experts (UN GGE) on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security is a format for a set number (15-25) of UN Member States, aimed at resulting in a consensus report.
United Nations Open-Ended Working Group (OEWG) on Developments in the Field of Information and Telecommunications in the Context of International Security is an open format for all UN Member States, aimed at resulting in a consensus report.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

International law governing cyber operations.

Add a skillset: International Organisations in Cyber

Please add specific skills relevant to you

Available skills:
The African Union (AU) is a continental union consisting of 55 member states located on the continent of Africa.
The Association of Southeast Asian Nations (ASEAN) is a regional grouping that promotes economic, political, and security cooperation among its ten members: Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam.
The Council of Europe is the continent's leading human rights organisation. It includes 47 member states, 27 of which are members of the European Union.
The European Union (EU) is a political and economic union of 27 member states that are located primarily in Europe.
The Forum of Incident Response and Security Teams (FIRST) is a global forum of incident response and security teams.
The International Telecommunication Union is a specialized agency of the United Nations responsible for many matters related to information and communication technologies.
The North Atlantic Treaty Organization (NATO) also called the North Atlantic Alliance, is an intergovernmental military alliance between 28 European countries, 2 North American countries, and 1 Asian country.
The Organization for Security and Co-operation in Europe (OSCE) is the world's largest security-oriented intergovernmental organization.
Today, the OAS brings together all 35 independent states of the Americas and constitutes the main political, juridical, and social governmental forum in the Hemisphere.
The United Nations (UN) is an intergovernmental organization aiming to maintain international peace and security, develop friendly relations among nations, achieve international cooperation, and be a centre for harmonizing the actions of nations.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

International organisations which focus on issues related on cyber security.

Add a skillset: Internet Governance

Please add specific skills relevant to you

Available skills:
The Domain Name System (DNS) is the Internet's system for mapping alphabetic names to numeric Internet Protocol (IP) addresses like a phone book maps a person's name to a phone number.
The Internet Corporation for Assigned Names and Numbers (ICANN) is a US-based not-for-profit public-benefit corporation whose role is to coordinate, at the overall level, the global Internet's systems of unique identifiers, and to ensure the stable and secure operation of these systems.
The Internet Governance Forum (IGF) is a multistakeholder governance group for policy dialogue on issues of Internet governance.
Network neutrality, most commonly called net neutrality, is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

A multistakeholder process which refers to the rules, policies, standards and practices that coordinate and shape global cyberspace.

Add a skillset: Internet of Things

Please add specific skills relevant to you

Available skills:
A sensor is a device that produces an output signal for the purpose of sensing of a physical phenomenon. IoT devices use embedded sensors (e.g. camera, thermometer, gyrometer, motion sensor, etc.) to collect data and transmit them to the processing unit.).
IoT devices are regularly connected via wireless communication, e.g. Bluetooth, WiFi, mobile networks. For security reasons, these connections must be secured.
IoT utilizes existing and emerging technology for sensing, networking, and robotics. IoT devices are implemented in a wide range of equipment from CCTV to unmanned vehicles.
IoT security is a subsect of cybersecurity that focuses on protecting, monitoring and remediating threats related to the Internet of Things (IoT) — or the network of connected devices that gather, store and share data via the internet. IoT devices should be secured and tested on official regulations or industry standards.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

The Internet of things (IoT) describes physical objects (or groups of such objects) that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.

Add a skillset: Law enforcement

Please add specific skills relevant to you

Available skills:
Cyber crime refers to a set of offenses which include technology as a means to fulfil illegal intent.
A branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and computer crime.
A careful examination or search in order to discover facts or gain information.
In cybercrime investigations must be tamperproof. This includes seamless documentation and proof of the chain of custody. Investigative techniques should follow these principles.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term encompasses police, courts, and corrections. Here specific to cyber related crime.

Add a skillset: Monitoring and threat detection

Please add specific skills relevant to you

Available skills:
Intrusion detection is a process of parsing and monitoring collected data from network and network nodes for suspicious activity and producing alerts or taking automated preveniton measures, when such activity is discovered.
Visual representation of data and information in a structured and systematic manner allowing easier interpretation and analysis.
System log analysis is a scientific process of collecting, parsing, reviewing, and interpreting time-sequenced event messages generated by network nodes to gain insight into system state and identify possible anomalies.
Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Security monitoring is a collection of processes and technologies, which involves collecting and analysing information produced by network nodes and their interaction to detect anomalies or suspicious behavior, triggering alerts, and taking applicable action on alerts.

Add a skillset: Secure system architecture and software development

Please add specific skills relevant to you

Available skills:
Generative AI (Gen AI) marks the next phase in the advancement of artificial intelligence. This subset of AI specialises in producing novel and original content. Unlike conventional AI systems that function based on pre-existing data and established rules, Generative AI creates new data and concepts, ranging from digital art to innovative text compositions.
DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality. DevOps is complementary with Agile software development; several DevOps aspects came from the Agile methodology.
The system development life cycle is the overall process of developing, implementing, and retiring information systems through a multistep process from initiation, analysis, design, implementation, and maintenance to disposal. The secure implementation of a software or system is part of the overall SDLC.
When devolping software, beside functional requirements, also security requirements must be defined from the beginning. This should include e.g. access control mechanisms, authentication, information flow, integrity, availability, confidentiality, etc. The requirements should base on a risk assessment.
Secure software devolpment follows various methodologies. Independent from the methodology, security should be included from the beginning of the development process.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic context around and inside societies. STRAT experts can support e.g. with broader technology governance and cyber diplomacy issues as well as with hands-on policy, doctrine and capability development support.
TECH
TECH stands for technical cybersecurity expertise in issues that directly relate to information technology (IT) or computer information systems (CIS) that support business processes, in either mainstream (business IT) or special environments (from Industrial Control Systems to various types of devices).
Please insert at least: 1
Maximum allowed count: 4

Security architecture is defined as the architectural design that includes all the threats and potential risks which can be present in the environment or that particular scenario. A software development life cycle (SDLC) is a formal or informal methodology for designing, creating, and maintaining software (which includes code built into hardware).

Add a skillset: Security testing

Please add specific skills relevant to you

Available skills:
Adversary emulation is a form of cybersecurity assessment, which implements the behaviour of threat actor groups based on real-world threat intelligence and tactics, techniques, and procedures.
Security testing is a collection of testing methods and approaches aimed at attempting to identify all possible vulnerabilities, threats, and risks towards organization assets to prevent malicious attacks.
Security testing standards are aimed at defining a set of common approaches and best practices in a structured and methodological manner.
Software testing is the process of evaluating and verifying that a software product or application does what it is supposed to do. The benefits of testing include preventing bugs, reducing development costs and improving performance.
Available skills:
Please insert at least: 1
Maximum allowed count: 10
added skills:
added skills:

Skill(set) focus (choose at least one)

LAW
LAW means law – but not only. It includes expertise on international and national law and legal frameworks – but also issues related to EU cyber policy and regulations, developing IT and cyber security standards, law enforcement and cyber crime etc. LAW experts’ support can include both policy and legal assessments.
OPS
OPS means operational issues, i.e. cybersecurity expertise that relates to achieving and maintaining cyber security and cyber resilience, including in the society-wide or whole-of-government context. OPS experts can provide practical advice on e.g. how to develop one’s cyber security capacity, techniques, structures and procedures.
STRAT
STRAT stands for expertise in strategic and global issues where cyber security shapes the strategic cont