CyberSec4Europe has published a number of generally available documents including reviewed project deliverables for download (those deliverables not yet formally reviewed or accepted are marked with *):
Governance Design and Pilot (WP2)
- Governance Challenges for European Cybersecurity Policy: Stakeholder Views
- Deliverable D2.1: Governance Structure
- Deliverable D2.2: Internal Validation of Governance Structure
- Deliverable D2.3: Governance Structure v2.0
- Deliverable D2.4: Roadmap of the Set-up of the NCC
Blueprint Design and Common Research (WP3)
- Deliverable D3.1: Common Framework Handbook #1
- Deliverable D3.2: Cross Sectoral Cybersecurity Building Blocks
- Deliverable D3.3: Research Challenges and Requirements to Manage Digital Evidence
- Deliverable D3.4: Analysis of Key Research Challenges for Adaptive Security
- Deliverable D3.5: Usable Security & Privacy Methods and Recommendations
- Deliverable D3.6: Guidelines for GDPR Compliant User Experience
- Deliverable D3.7: Usability Requirements Validation
- Deliverable D3.8: Framework and Toolset for Conformity
- Deliverable D3.9: Research Challenges and Requirements for Secure Software Development
- Deliverable D3.10: Cybersecurity Outlook 1
- Deliverable D3.11: Definition of Privacy by Design and Privacy Preserving Enablers
- Deliverable D3.12: Common Framework Handbook 2
- Deliverable D3.13: Updated Version Of Enablers And Components
- Deliverable D3.14: Cooperation With Threat Intelligence Services For Deploying Adaptive Honeypots
- Deliverable D3.15: Proactive Approaches For Software Development
- Deliverable D3.16: Security Requirements And Risks Conceptualisation
- Deliverable D3.17: Integration To Demonstration Cases
- Deliverable D3.18: Analysis Of Interoperability And Cross-Border Compliance Issues
- Deliverable D3.19: Guidelines for Enhancement of Societal Security Awareness
- Deliverable D3.20: Final Cybersecurity Enablers And Underlying Technologies Components
- Deliverable D3.21: Framework To Design And Implement Adaptive Security Systems
- Deliverable D3.22: Validation And Certification Methodology
- Deliverable D3.23: Cybersecurity Outlook 2
Research and Development Roadmap (WP4)
- Deliverable D4.1: Requirements Analysis from Vertical Stakeholders
- Deliverable D4.2: Legal Framework
- Deliverable D4.3: Research and Development Roadmap
- Deliverable D4.4: Research and Development Roadmap 2
- Deliverable D4.5: Research and Development Roadmap 3
- Deliverable D4.6: Evaluation Of The Research and Innovation Roadmap
- Deliverable D4.7: Future Horizon Roadmap Blue Book
Demonstration Use Cases (WP5)
- Deliverable D5.1: Requirements Analysis of Demonstration Cases
- Deliverable D5.2: Specification and Set-up Demonstration case Phase 1
- Deliverable D5.3: Validation of Demonstration Case Phase 1
- Deliverable D5.4: Requirements Analysis of Demonstration Cases Phase 2
- Deliverable D5.5: Specification And Set-Up Demonstration Case Phase 2
- Deliverable D5.6: Validation Demonstration Case Phase 2
Cybersecurity Skills and Capability Building (WP6)
- Deliverable D6.1: Case Pilot for WP2 Governance
- Deliverable D6.2: Education and Training Review
- Deliverable D6.3: Design of Education and Professional Framework
- Deliverable D6.4: Flagship 1
- Deliverable D6.5: Flagship 2
- Deliverable D6.6: Final Education and Assessment Framework
Open tools and infrastructures for certification and validation (WP7)
- Deliverable D7.1: Report on Existing Cyber Ranges, Requirements
- Deliverable D7.2: Virtual Lab For Open Source Tools Education and Research
- Deliverable D7.3: Evaluation Report On Integration Demonstration
- Deliverable D7.4: Common Virtual Lab With Open-source Tools For Research And Development
- Deliverable D7.5: Open Tool Portal
- Deliverable D7.6: Collection Of Agreements, Guidance Documentation And Dissemination Materials
- Deliverable D7.7: The Role Of Certification And Its Implementations
Standardisation (WP8)
- Deliverable D8.1: Cybersecurity Standardization Plan
- Deliverable D8.2: Project Standards Matrix (together with the Standards Matrix)
- Deliverable D8.3: Cybersecurity Standardization Engagement Plan 2
- Deliverable D8.4: Standardisation Procedure Assessment Document
- D8.5: Standards Matrix 1 (spreadsheet)
- D8.5: Standards Matrix
Dissemination, Outreach, Spreading of Competence, Raising Awareness, Exploitation (WP9)
- Deliverable D9.1: Website and Social Media Accounts 1
- Deliverable D9.4: Website and Social Media Accounts 2
- Deliverable D9.9: Website and Social Media Accounts 3
- Deliverable D9.15: Website And Social Media Accounts 4
- Deliverable D9.22: Website And Social Media Accounts 5
- Deliverable D9.2: Dissemination Material: Brochures, Posters
- Deliverable D9.3: Dissemination and Awareness Plan
- Deliverable D9.5: Report on the Outreach and Dissemination Activities 1
- Deliverable D9.10: Report On The Outreach and Dissemination Activities 2
- Deliverable D9.23: Final Report On The Outreach And Dissemination Activities
- Deliverable D9.6: SME Cybersecurity Awareness Program 1
- Deliverable D9.11: SME Cybersecurity Awareness Program 2
- Deliverable D9.17: SME Cybersecurity Awareness Program 3
- Deliverable D9.7: CyberSec4Europe Summer Schools 1
- Deliverable D9.16: CyberSec4Europe Summer Schools 2
- Deliverable D9.24: CyberSec4Europe Summer Schools 3
- Deliverable D9.8: Policy Recommendations 1
- Deliverable D9.20: Policy Recommendations 2
- Deliverable D9.28: Policy Recommendations 3
- Deliverable D9.12: Supply Chain Security Recommendations 1
- Deliverable D9.25: Supply Chain Security Recommendations 2
- Deliverable D9.13: Awareness Effectiveness Study 1
- Deliverable D9.18: Awareness Effectiveness Study 2
- Deliverable D9.26: Awareness Effectiveness Study 3
- Deliverable D9.14: Exploitation Strategy Report 1
- Deliverable D9.19: Exploitation Strategies Report 2
- Deliverable D9.27: Exploitation Strategy Report 3