|
Content Assessment: Mapping Threats? A Cybersecurity Threat Landscape Framework from ENISA
Information - 91%
Insight - 89%
Relevance - 90%
Objectivity - 93%
Authority - 94%
91%
Excellent
A short percentage-based assessment of the qualitative benefit of the recently released report from the European Union Agency for Cybersecurity (ENISA) on its cybersecurity threat landscape methodology.
Editor’s Note: From time to time, ComplexDiscovery highlights publicly available or privately purchasable announcements, content updates, and research from cyber, data, and legal discovery providers, research organizations, and ComplexDiscovery community members. While ComplexDiscovery regularly highlights this information, it does not assume any responsibility for content assertions.
To submit recommendations for consideration and inclusion in ComplexDiscovery’s cyber, data, and legal discovery-centric service, product, or research announcements, contact us today.
Background Note: The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe. Established in 2004 and strengthened by the EU Cybersecurity Act, the European Union Agency for Cybersecurity contributes to EU cyber policy, enhances the trustworthiness of ICT products, services, and processes with cybersecurity certification schemes, cooperates with Member States and EU bodies, and helps Europe prepare for the cyber challenges of tomorrow. Through knowledge sharing, capacity building, and awareness-raising, the Agency works together with its key stakeholders to strengthen trust in the connected economy, to boost resilience of the Union’s infrastructure, and, ultimately, to keep Europe’s society and citizens digitally secure. Focused on knowledge sharing and awareness-raising, this new report presents a threat landscape methodology that may be beneficial for cybersecurity, information governance, and legal discovery professionals seeking to better consider, consolidate, and communicate cybersecurity threats.
Press Release and Report*
ENISA Cybersecurity Threat Landscape Methodology
European Union Agency for Cybersecurity (ENISA)
Press Release
How to Map the Cybersecurity Threat Landscape? Follow the ENISA 6-Step Methodology
The cybersecurity threat landscape methodology developed by the European Union Agency for Cybersecurity (ENISA) aims at promoting consistent and transparent threat intelligence sharing across the European Union.
With a cyber threat landscape in constant evolution, the need for updated and accurate information on the current situation is growing and this is a key element for assessing relevant risks.
This is why ENISA releases today an open and transparent framework to support the development of threat landscapes.
The ENISA methodology aims to provide a baseline for the transparent and systematic delivery of horizontal, thematic, and sectorial cybersecurity threat landscapes (CTL) thanks to a systematic and transparent process for data collection and analysis.
Who can benefit from this new methodology?
This new methodology is made available to ENISA’s stakeholders and to other interested parties who wish to generate their own cyber threat landscapes. Adopting and/or adapting the proposed new CTL framework will enhance their ability to build situational awareness, to monitor, and to tackle existing and potential threats.
ENISA will also be using this new methodology to deliver an enhanced annual ENISA Threat Landscape (ETL). It will also be used to generate technical or sectorial threat landscapes.
How does the methodology work?
The framework is based on the different elements considered in the performance of the cybersecurity threat landscape analysis. It, therefore, includes the identification and definition of the process, methods and tools used as well as the stakeholders involved.
Building on the existing modus operandi, this methodology provides directions on the following:
- defining components and contents of each of the different types of CTL;
- assessing the target audience for each type of CTL to be performed;
- how data sources are collected;
- how data is analyzed;
- how data is to be disseminated;
- how feedback is to be collected and analyzed.
The ENISA methodology consists of six main steps with feedback foreseen and associated with each of these steps:
- Direction;
- Collection;
- Processing;
- Analysis and production;
- Dissemination;
- Feedback
This CTL methodology has been validated by the ENISA ad-hoc working group on the Cybersecurity Threat Landscape (CTL WG). The group consists of European and international experts from both public and private sector entities.
ENISA’s work on the Cybersecurity Threat Landscape
ENISA is constantly looking for ways to gather feedback and to continually improve and update the methodology applied to the performance of cybersecurity threat landscapes. Please feel free to reach out to etl@enisa.europa.eu with suggestions.
The ENISA CTL methodology intends to provide a high-level overview of how to produce a CTL. This methodology is therefore meant to evolve in time according to any possible new developments in the process. The ongoing research and work ENISA performs in the area is meant to ensure the transparency and trust in the contents of the reports produced.
Target Audience
- European Commission and European Member States policy makers (including but not limited to European Union Institutions (EUIs);
- EU institutions, bodies and Agencies (EUIBAs);
- Cybersecurity experts, industry, vendors, solution providers, SMEs;
- Member States and national authorities (e.g. Cybersecurity Authorities);
Read the original announcement.
Complete Report: ENISA Cybersecurity Threat Landscape Methodology (PDF) – Mouseover to Scroll
ENISA Cybersecurity Threat Landscape MethodologyAdditional Reading
- [Annual Update] International Cyber Law in Practice: Interactive Toolkit
- Defining Cyber Discovery? A Definition and Framework
Source: ComplexDiscovery