Standardisation in support of the Cybersecurity Certification
The document presents the value of the cybersecurity standardisation efforts for certification, the roles and responsibilities of Standards Developing Organisations (SDOs) in this context, and discusses various ways how standardisation can support…
Cybersecurity Certification Market Study
This study proposes a set of initial methodological steps to work towards a market analysis on cybersecurity certification of ICT products, ICT services and ICT processes. The performance of a market analysis on cybersecurity certification aims to…
Challenges of security certification in emerging ICT environments
This report aims to provide decision makers with a thorough description of the security certification status concerning the most impactful equipment in five different critical business sectors. Results of this study should help to improve and…
ICT security certification opportunities in the healthcare sector
The scope of this report covers functional requirements for a potential ICT security certification scheme for a widely understood healthcare sector.
Encrypted Traffic Analysis
This report explores the current state of affairs in Encrypted Traffic Analysis and in particular discusses research and methods in 6 key use cases; viz. application identification, network analytics, user information identification, detection of…
The 2024 ERA-ENISA Conference on Railway Cybersecurity seeks to strengthen sector preparedness and resilience against current threats
Amidst emerging technology advancements and evolving security challenges in the sector, the fourth edition of the conference aims to explore the railway cybersecurity threats landscape.
Cybersecurity Market Analysis Framework
The ENISA Cybersecurity Market Analysis Framework is a “cookbook” on how EU cybersecurity market analyses can be performed. is the cornerstone of ENISA activities in analysing the EU cybersecurity market, as it is used within ENISA to scope,…
Telecom sector and Digital Infrastructure
Fostering robust cybersecurity practices in the telecommunications industry