{"id":387,"date":"2015-08-20T16:21:59","date_gmt":"2015-08-20T15:21:59","guid":{"rendered":"http:\/\/swivelsecure.com\/?p=387"},"modified":"2019-01-22T11:25:39","modified_gmt":"2019-01-22T11:25:39","slug":"what-constitutes-good-cybersecurity-policy-making","status":"publish","type":"post","link":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/","title":{"rendered":"What constitutes good cybersecurity policy-making?"},"content":{"rendered":"<p>Hacking is becoming an increasingly organised, resourceful and well-funded business. The result: governments, enterprises and individuals are being subjected to an unprecedented number of sophisticated and damaging attacks.<\/p>\n<p>Governments across the globe have recognised that to tackle the hackers, they too must be organised, resourceful and well-funded. For example, the UK government has recently pledged an additional \u00a32 billion to combat cyberattacks.<\/p>\n<p>The provisioning of funding is undoubtedly a good start. Throwing money blindly at a problem, however, rarely translates into success. To be effective, the money must be invested in sound policies.<\/p>\n<p>But this begs a question, what constitutes good cybersecurity policy-making?<\/p>\n<p>In search of an answer to this question, we can turn to Spain and, more specifically, the Spanish National Cybersecurity Institute (INCIBE). INCIBE is a publicly funded association that fosters cross-sector collaboration between government, academics, IT professionals, enterprises and the general public to promote the development of cybersecurity on both a national and international level.<\/p>\n<p>INCIBE employs numerous strategies to combat cybercrime. A key initiative is the Security and Industry Computer Emergency Response Team (CERT). CERT works to identify, analyse and prevent threats, and provides assistance and support when security incidents do occur.<\/p>\n<p>Another important aspect of INCIBE\u2019s work is to tackle the misnomer that IT security is solely the concern of the geeks in the basement. Here at Swivel, we constantly talk about how enterprises must take a holistic approach to security from the ground level upwards. INCIBE shares this view, and has produced a comprehensive range of educational resources to raise awareness as to the role everyone must play in securing information.<\/p>\n<p>It is important that enterprises are also empowered to take control and address vulnerabilities. To do so, INCIBE has produced a catalogue of registered solutions, which includes Swivel Secure, that can be utilised to protect systems and data from malicious attacks.<\/p>\n<p>Governments around the world are finally starting to wake up to the threats posed by hackers. Those seeking an example of best practice need look no further than INCIBE. There are many lessons here that can be both learned and replicated in the search for stronger cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking is becoming an increasingly organised, resourceful and well-funded business. &hellip;<\/p>\n","protected":false},"author":2,"featured_media":388,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-387","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Good cybersecurity policy-making guidelines<\/title>\n<meta name=\"description\" content=\"Governments across the globe have recognised that to tackle the increasing threat of hackers. Here are some strategies being used to combat cybercrime.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What constitutes good cybersecurity policy-making?\" \/>\n<meta property=\"og:description\" content=\"Governments across the globe have recognised that to tackle the increasing threat of hackers. Here are some strategies being used to combat cybercrime.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/\" \/>\n<meta property=\"og:site_name\" content=\"Swivel Secure Russian\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-20T15:21:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-22T11:25:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2654\" \/>\n\t<meta property=\"og:image:height\" content=\"1769\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victoria Laws\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victoria Laws\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/\",\"url\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/\",\"name\":\"Good cybersecurity policy-making guidelines\",\"isPartOf\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg\",\"datePublished\":\"2015-08-20T15:21:59+00:00\",\"dateModified\":\"2019-01-22T11:25:39+00:00\",\"author\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\"},\"description\":\"Governments across the globe have recognised that to tackle the increasing threat of hackers. Here are some strategies being used to combat cybercrime.\",\"breadcrumb\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#primaryimage\",\"url\":\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg\",\"contentUrl\":\"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg\",\"width\":2654,\"height\":1769},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swivelsecure.com\/ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What constitutes good cybersecurity policy-making?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#website\",\"url\":\"https:\/\/swivelsecure.com\/ru\/\",\"name\":\"Swivel Secure Russian\",\"description\":\"Protecting Identities with Intelligent Authentication\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swivelsecure.com\/ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\",\"name\":\"Victoria Laws\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"caption\":\"Victoria Laws\"},\"url\":\"https:\/\/swivelsecure.com\/ru\/blog\/author\/v-laws\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Good cybersecurity policy-making guidelines","description":"Governments across the globe have recognised that to tackle the increasing threat of hackers. Here are some strategies being used to combat cybercrime.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What constitutes good cybersecurity policy-making?","og_description":"Governments across the globe have recognised that to tackle the increasing threat of hackers. Here are some strategies being used to combat cybercrime.","og_url":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/","og_site_name":"Swivel Secure Russian","article_published_time":"2015-08-20T15:21:59+00:00","article_modified_time":"2019-01-22T11:25:39+00:00","og_image":[{"width":2654,"height":1769,"url":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg","type":"image\/jpeg"}],"author":"Victoria Laws","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Victoria Laws","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/","url":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/","name":"Good cybersecurity policy-making guidelines","isPartOf":{"@id":"https:\/\/swivelsecure.com\/ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#primaryimage"},"image":{"@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#primaryimage"},"thumbnailUrl":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg","datePublished":"2015-08-20T15:21:59+00:00","dateModified":"2019-01-22T11:25:39+00:00","author":{"@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514"},"description":"Governments across the globe have recognised that to tackle the increasing threat of hackers. Here are some strategies being used to combat cybercrime.","breadcrumb":{"@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#primaryimage","url":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg","contentUrl":"https:\/\/swivelsecure.com\/ru\/wp-content\/uploads\/sites\/5\/2018\/04\/black-and-white-city-man-people_160606_155133.jpg","width":2654,"height":1769},{"@type":"BreadcrumbList","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/08\/20\/what-constitutes-good-cybersecurity-policy-making\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swivelsecure.com\/ru\/"},{"@type":"ListItem","position":2,"name":"What constitutes good cybersecurity policy-making?"}]},{"@type":"WebSite","@id":"https:\/\/swivelsecure.com\/ru\/#website","url":"https:\/\/swivelsecure.com\/ru\/","name":"Swivel Secure Russian","description":"Protecting Identities with Intelligent Authentication","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swivelsecure.com\/ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514","name":"Victoria Laws","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","caption":"Victoria Laws"},"url":"https:\/\/swivelsecure.com\/ru\/blog\/author\/v-laws\/"}]}},"_links":{"self":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/media\/388"}],"wp:attachment":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}