Skip to content
Cybersecurity Deployment Preparedness Support, Capacity & Capabilities
About
About
Relevant, Important, Necessary
Stay in touch
Partners
News
Announcing CYSSDE
Aankondiging CYSSDE
Capacity Building
Penetration testing
Pentesting – Methodology vs Framework
Pentesting – Infrastructure Landscape
Pentesting – Evaluation for Methodologies and Frameworks
Pentesting – Types of Methodologies and Frameworks
Tooling
Critical Infrastructure Protection (CIP) – CER Directive
NIS2 – Network and Information Security 2 Directive
CYSSDE Activities
Open Calls – FSTP
Open Call 1 – Involvement of NCCs – Closed
Open Call 2 – Pen Testing – Open Now
Stay informed on the open calls
Events and Interactions
Meet us in Person
Meeting Online – Webinars
To whom? target audiences of the activities
CYSSDE
Cybersecurity Deployment Preparedness Support, Capacity & Capabilities
About
About
Relevant, Important, Necessary
Stay in touch
Partners
News
Announcing CYSSDE
Aankondiging CYSSDE
Capacity Building
Penetration testing
Pentesting – Methodology vs Framework
Pentesting – Infrastructure Landscape
Pentesting – Evaluation for Methodologies and Frameworks
Pentesting – Types of Methodologies and Frameworks
Tooling
Critical Infrastructure Protection (CIP) – CER Directive
NIS2 – Network and Information Security 2 Directive
CYSSDE Activities
Open Calls – FSTP
Open Call 1 – Involvement of NCCs – Closed
Open Call 2 – Pen Testing – Open Now
Stay informed on the open calls
Events and Interactions
Meet us in Person
Meeting Online – Webinars
To whom? target audiences of the activities
CYSSDE
CYSSDE Activities