Tools and Resources
GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)
Some elements of ICT have become critical for national security. These elements form the Critical Information Infrastructure (CII) of a nation. Protection of CII (CIIP) has obtained worldwide attention which
Companion Document to the GFCE-MERIDIAN Good Practice Guide on CIIP
The 2016 GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for governmental policy-makers (hereafter: 2016 GPG) outlined that Critical Information Infrastructure Protection (CIIP) is a complex but important topic
The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers
Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. Nations at large critically depend on Critical Infrastructure (CI) services such as energy supply, telecommunications, financial systems,
GFCE Global Good Practices: Create a Website for Testing Standards Compliance
Fully implementing open standards for network services and functions can prevent abuse in various forms (e.g. phishing and botnet infection). Complete and correct standards compliance can diminish the impact of
GFCE Global Good Practices: Establish a National Multistakeholder Platform to Promote Standards
“Better safe than sorry.” Prevention means increasing the security of the system, including through implementing the latest standards. How can we make sure the right players are gathered to discuss
Stimulate Local Ownership of Capacity Building Programmes through National Project Teams
How can international and regional forums, donors, and development agencies stimulate local ownership of the capacity building programmes they wish to support? How can countries ensure commitment in capacity building
Focus Awareness-Building Through a Cybersecurity Awareness Month
The National Cybersecurity Awareness Month (NCSAM) is an example of a cybersecurity awareness campaign at national level that builds on the attention provided by declaring a month dedicated to a
Align National Campaigns
Cooperation, alignment, and coordination with others is beneficial. In planning and organising an awareness campaign, it is advisable to coordinate with other existing national and international awareness campaigns. If stakeholders
GFCE Global Good Practices: Internet Infrastructure Initiative (III)
A foundation for internet security is provided by the ecosystem of protocols, standards, technology, practices and organisations that are the internet’s infrastructure. An important contribution to a secure and resilient
Produce and Present Trusted Metrics about Systemic Risk Conditions
A statistics platform, featuring metrics and data visualisation, allows for the measurement of key indicators of malicious activity and risk conditions, and enables analytical insight about patterns, priorities, and trends
Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks
Internet networks are replete with systemic vulnerabilities. CERTs and other trusted operators require reliable information about their network’s health over time. Various organisations have set up systems to scan networks
Report: Advancing Cybersecurity with Africa
The Global Forum on Cyber Expertise Partnered with the African Union (AU) to enable AU Member states to better understand their current cyber capacities and to support the African nations
Terms of Reference GFCE
This document provides further details on the operational aspects of the GFCE and should be read in junction with the GFCE Framework Document and The Hague Declaration on the GFCE.
The Hague Declaration on the GFCE
Political statement of the 42 founding members during the launch of the GFCE on 16 April 2015 at the Global Conference on CyberSpace 2015 in The Hague.
Framework Document GFCE
This Framework Document outlines the structure and operation of the GFCE in a way that is voluntary. complementary, inclusive and resource driven.
CSIRT Maturity Kit
The purpose of this CSIRT Maturity Kit is to help emerging and existing Computer Security Response Teams (CSIRTs) to increase their maturity level. This is achieved by offering a set
Events