# Define access-restrictions for robots/spiders # http://www.robotstxt.org/wc/norobots.html # By default we allow robots to access all areas of our site # already accessible to anonymous users User-agent: * Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/mailer Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/replyto Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/title-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/topic Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/affiliation Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/thank-you Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/cloud-sg Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/stakeholder-representation-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/short-summary-of-your-experience-in-the-cloud-security-area Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/upload-cv Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/cloudsec-application-form/please-enter-the-characters-you-see-below Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/incident-reporting-for-cloud-computing/test/please-fill-in-your-name-and-organization Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/incident-reporting-for-cloud-computing/test/please-fiil-in-your-email Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/incident-reporting-for-cloud-computing/test/1-what-sort-of-organization-do-you-work-for Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/incident-reporting-for-cloud-computing/test/2-do-you-report-security-incidents-to-external-parties-if-no-skip-to-section-b Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/incident-reporting-for-cloud-computing/test/reporting-mechanism-snapshot Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/incident-reporting-for-cloud-computing/test/5-which-incidents-are-or-should-be-reported Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/general-info Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/general-info/your-name-and-surname Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/general-info/your-email Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/general-info/your-affilication-company-title-etc Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy2_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy2_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy2_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy3_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy3_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy3_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy4_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy4_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy4_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy5_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy5_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy5_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy6_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy6_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy6_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy7_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy7_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy7_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy8_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy8_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/copy8_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/opportunities/other-opportunities-we-should-consider-and-or-comments Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy18_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy18_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy18_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy18_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy18_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy19_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy19_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy19_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy19_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy19_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy20_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy20_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy20_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy20_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy20_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy21_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy21_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy21_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy21_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy21_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy23_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy23_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy23_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy23_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy23_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy22_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy22_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy22_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy22_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy22_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy25_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy25_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy25_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy25_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy25_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy26_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy26_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy26_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy26_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy26_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy27_of_r-1-lock-in-1 Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy27_of_r-1-lock-in-1/probability Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy27_of_r-1-lock-in-1/impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy27_of_r-1-lock-in-1/s2-likelihood Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/copy27_of_r-1-lock-in-1/s2-impact Disallow: https://resilience.enisa.europa.eu/cloud-security-and-resilience/risk-assessment-for-SMEs/risks/other-risks-to-be-considered-and-or-comments Disallow: https://resilience.enisa.europa.eu/cloud-computing-certification/list-of-cloud-certification-schemes/certified-cloud-service/++conversation++default/1460485651062078 Disallow: https://resilience.enisa.europa.eu/cloud-computing-certification/list-of-cloud-certification-schemes/service-organization-control-soc-2-report/++conversation++default/1431326629907509 Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/mailer Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/replyto Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/company Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/company-1 Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/level-of-responsibilities Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/field-of-expertise Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/comments Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/thank-you Disallow: https://resilience.enisa.europa.eu/EGFI/expression-of-interest-for-the-expert-group-for-finance-ict-security-eg-fi/your-name Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/mailer Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/15th-january Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/16th-january Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/title-2 Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/first-name Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/last-name Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/replyto Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/company-organisation-institution Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/thank-you Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/country-1 Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/captcha Disallow: https://resilience.enisa.europa.eu/EGFI/EGFI-january2015-meeting-registration/registration-ep3r-19th-20th-april-2012 Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/mailer Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/replyto Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/title-1 Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/topic Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/affiliation Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/thank-you Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/ics-sg Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/stakeholder-representation-1 Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/short-summary-of-your-experience-in-the-ics-security-area Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/upload-cv Disallow: https://resilience.enisa.europa.eu/ics-security/ics-sg-application-form/please-enter-the-characters-you-see-below Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/mailer Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/replyto Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/title-1 Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/topic Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/affiliation Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/thank-you Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/ics-sg Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/stakeholder-representation-1 Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/short-summary-of-your-experience-in-the-ics-security-area Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/upload-cv Disallow: https://resilience.enisa.europa.eu/ehealth-security/ehealth-application-form/please-enter-the-characters-you-see-below Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/mailer Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/4th-workshop-on-article-13 Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/thank-you Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/contact-details Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/contact-details/name Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/contact-details/affiliation Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/contact-details/email Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/contact-details/copy_of_4th-article-13a-ws Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/contact-details/4th-article-13a-ws Disallow: https://resilience.enisa.europa.eu/article-13/workshops/6th-article-13a-workshop/4th-workshop-on-article-13-registration-form/please-enter-the-characters-you-see-below Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/copy_of_mailer Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/title-1 Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/copy_of_topic Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/copy_of_replyto Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/affiliation Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/copy_of_thank-you Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/ics-sg Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/stakeholder-representation-1 Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/short-summary-of-your-experience-in-the-ics-security-area Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/upload-cv Disallow: https://resilience.enisa.europa.eu/transport-security/transsec-security-group-application-form/please-enter-the-characters-you-see-below Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/mailer Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/replyto Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/comments Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/thank-you Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/title-1 Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/name Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/affiliation Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/stakeholder-representation Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/short-relevant-experience-summary-and-added-value-you-bring-to-the-eics-group Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/upload-cv Disallow: https://resilience.enisa.europa.eu/eics-experts-group/eics-application-form/please-enter-the-characters-you-see-below Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/name-and-affiliation Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras/nra-gives-access-to-providers-2013-by-typing-an-email-address-the-name-of-the-person-the-name-of-the-provider-and-clicking-2018add2019-an-account-will-be-created-an-email-sent-to-the-person-name-of-person-and-provider-is-only-used-to-keep-track-of-account Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras/2022-providers-have-access-to-certain-see-below-incident-reports-incident-reports-are-anonimized-and-not-directly-linkable-to-a-period-in-the-year-a-country-or-a-provider Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras/2022-providers-can-browse-incident-reports-accessible-to-them-and-filter-on-causes-assets-services-affected-et-cetera Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras/providers-can-comment-on-incidents-and-in-this-way-start-a-discussion Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras/providers-can-see-recent-comments-of-other-providers Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras/2022-providers-can-ask-to-be-put-in-contact-with-the-provider-in-question-enisa-forwards-contact-request-to-nra-nra-forwards-contact-request-to-relevant-provider-who-can-respond-or-ignore Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-we-provide-brief-descriptions-of-different-possible-extensions-of-ciras/2022-enisa-will-provide-a-manual-explaining-how-sharing-works-and-gives-examples-of-incident-reports-for-the-sake-of-clarity Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-a-list-of-different-options-for-sharing-incidents-between-providers-across-the-eu Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-a-list-of-different-options-for-sharing-incidents-between-providers-across-the-eu/all-eu-reports-are-shared-and-accessible-by-providers-providers-can-flag-sensitive-reports-a-posteriori-nras-can-exclude-certain-incidents-providers-can-flag-incidents-deemed-sensitive-the-nra-of-the-country-in-question-will-be-notified-of-this Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-a-list-of-different-options-for-sharing-incidents-between-providers-across-the-eu/yearly-enisa-and-nras-select-a-subset-of-eu-reports-relevant-for-eu-wide-sharing-nras-share-this-subset-with-providers-all-providers-get-access-to-this-subset Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-a-list-of-different-options-for-sharing-incidents-between-providers-across-the-eu/nras-offer-an-opt-in-to-providers-if-a-provider-opts-in-then-his-incident-reports-if-included-in-annual-summary-reporting-or-adhoc-reporting-become-accessible-to-other-providers-across-the-eu-providers-who-opt-in-get-access Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-a-list-of-different-options-for-sharing-incidents-between-providers-across-the-eu/nras-offer-an-opt-in-to-providers-per-incident-provider-reviews-the-incident-report-and-approves-sharing Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/below-a-list-of-different-options-for-sharing-incidents-between-providers-across-the-eu/independent-of-national-reporting-or-reporting-by-nras-providers-can-submit-incident-reports-directly-for-eu-wide-sharing-with-other-providers Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/2-core-router-hack-breach-core-routers-of-a-provider-are-hacked-by-criminals-metadata-about-1000s-of-customer-communications-were-exfiltrated-no-outage-occurred Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy2_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/basestation-vulnerability-risk-100s-of-base-stations-have-been-found-to-be-vulnerable-and-several-base-stations-in-certain-areas-have-been-hacked-exposing-the-communications-of-mobile-customers-using-these-base-stations Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy3_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/network-protocol-vulnerabilities-risk-vulnerabilities-are-found-in-the-3g-network-protocol-which-allows-to-intercept-and-spoof-mobile-phones-there-is-a-real-possibility-that-these-vulnerabilities-are-being-exploited-already-or-will-be-exploited-soon Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy4_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/voicemail-boxes-breach-1000s-of-voice-mail-boxes-have-standard-easy-to-guess-passwords-journalists-have-accessed-voice-mails-of-politicians-to-showcase-the-vulnerability Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy5_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/ddos-attacks-risk-provider-discovers-finds-out-about-network-protocol-flaws-for-example-in-udp-allowing-to-generate-with-a-single-packet-a-flood-of-response-traffic-overwhelming-the-victim Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy6_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/bgp-route-error-involuntary-outage-employee-at-provider-makes-an-operational-error-configuring-bgp-routes-leading-to-a-diversion-of-traffic-the-incident-is-quickly-discovered-and-addressed-but-1000s-of-users-have-experienced-minor-availability-issu Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy7_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/dns-misconfiguration-a-corrupt-zone-file-of-your-country-code-top-level-domain-is-being-distributed-to-dns-servers-causing-the-websites-under-the-top-level-domain-to-be-unreachable Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy8_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/ixp-burglary-risk-the-premises-of-a-large-european-ixp-are-infiltrated-by-criminals-pretending-to-be-maintenance-staff-the-ixp-upon-deeper-investigation-does-not-find-any-traces-of-tampering Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy9_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/customer-premise-equipment-update-outage-a-wrong-buggy-update-pushed-automatically-by-the-isp-to-customer-premise-equipment-results-in-a-loss-of-service-for-the-end-user Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy10_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/customer-premise-equipment-vulnerability-risk-provider-discovers-that-1000s-of-voip-systems-sold-to-customers-as-customer-premise-equipment-can-be-hacked-exposing-1000s-customers-to-eavesdropping-dialler-fraud-et-cetera Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy11_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/emergency-patch-outage-provider-discovers-important-vulnerability-in-wifi-hotspots-which-would-allow-attackers-to-spoof-and-eavesdrop-on-traffic-provider-after-informing-customers-takes-the-hotspots-offline-to-reduce-risks-for-customers-while-fix Disallow: https://resilience.enisa.europa.eu/article-13/pan-eu-sharing-between-providers/relevant-for-sharing/copy12_of_1-fiber-cuts-outage-in-and-excavation-for-laying-down-gas-pipes-optical-fibers-are-accidently-dug-up-causing-cable-breaks Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/mailer Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/1st_ECRG_meeting Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/thank-you Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/membership2 Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/contact-details Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/contact-details/name Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/contact-details/title-1 Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/contact-details/affiliation Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/contact-details/email Disallow: https://resilience.enisa.europa.eu/ecrg/ecrg-meetings/1st-ecrg-meeting-berlin/ECRG_meeting/please-enter-the-characters-you-see-below Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/fieldas-an-electronic-communications-service-provider-what-services-do-you-offer-to-you-customers Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/loss-of-control Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/integration Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/updates-upgrades Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/maintenance Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/documentation Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/support Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/compliance Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/audits Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/contractual-issues Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/no-good-slas-or-kpis Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/cultural-issues Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/vendor-lock-in Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/software-vulnerabilities Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/information-about-vulnerabilities-and-issues-in-general Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/lack-of-security-controls Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-a/weakness-of-security-controls Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/2-is-there-national-legislation-that-applies-specifically-to-your-relation-with-ict-outsourcing-or-ict-vendors Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/3-does-your-organization-have-security-policies-or-guidelines-which-apply-to-your-relation-with-ict-outsourcing-or-ict-vendors Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/do-you-do-a-network-and-information-security-nis-risk-assessment-before-procuring-an-ict-product-or-service Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1 Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/software-security-vulnerabilities-design-error Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/vendor-lock-in-causing-incidents Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/congestion-overload Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/cable-cuts Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/power-cuts Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/downtime-caused-by-administrative-or-legal-issues Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/hardware-failures Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/faulty-changes-upgrades Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/configuration-errors Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/bad-maintenance Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/insider-attacks Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/social-engineering-attacks Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/denial-of-service-attack Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/4-b-if-yes-which-nis-risks-do-you-take-into-account-please-prioritize-your-choices-more-than-one-risk-may-be-on-the-same-level-of-prioritization-1/theft Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/5-as-part-of-the-contract-do-you-require-that-your-vendors-follow-certain-security-practices-e-g-certification-specific-security-management-procedures-access-control-policy-minimum-employees2019-security-background-etc Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/6-do-you-have-a-policy-on-integrating-new-equipment-if-yes-could-you-provide-us-with-some-key-requirements-of-that-policy Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/organizational-security Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/human-resource-security Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/physical-and-environmental-security Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/incident-management Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/business-continuity Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/monitoring-and-logging Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/testing-and-auditing Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/integration-migration Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/slas-kpis Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/7-what-security-requirements-do-you-take-into-account-when-procuring-5-always-4-often-3-sometimes-2-rarely-1-never/monitoring-reporting-by-ict-vendor-outsourcing-partners Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/8-do-you-consistently-monitor-the-performance-of-your-equipment-and-if-yes-do-you-revert-to-your-signed-slas-and-kpis-for-compensation-if-the-criteria-are-not-met Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/9-do-you-consistently-monitor-the-performance-of-your-outsourced-services-and-if-yes-do-you-revert-to-your-signed-slas-and-kpis-for-compensation-if-the-criteria-are-not-met Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/10-do-you-perform-or-request-reports-of-3rd-parties-who-have-performed-audits-to-your-vendors-and-outsourcing-partners Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/11-do-you-request-any-international-certifications-from-your-vendors-and-outsourcing-partners-if-yes-which-ones Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/12-do-you-have-a-predefined-exit-strategy-policy-when-decommissioning-equipment-or-when-stopping-the-outsourcing-if-yes-could-you-provide-a-short-description Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/13-while-a-strong-procurement-security-requirements-framework-would-assist-in-mitigating-the-risks-associated-with-the-acquisition-of-ict-products-and-services-from-vendors-it-is-bringing-potential-negative-effects-to-the-providers-in-your-opinion-wha Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/14-what-would-you-like-to-have-in-a-buyer2019s-guide-to-address-your-concerns-regarding-procurement-of-ict-products-services Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/15-what-would-you-like-enisa-to-offer-in-the-future-regarding-the-topic-of-procurement-of-ict-products-services Disallow: https://resilience.enisa.europa.eu/ecrg/ict-dependencies-study-questionnaire/16-any-other-remarks-or-proposals-regarding-this-topic Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/please-enter-your-name Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/please-enter-your-email-address Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/please-enter-the-name-of-your-company Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/country-1 Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/1-describe-the-nature-of-your-organisation2019s-business-its-number-of-employees-5000-5000-250-50-10-and-the-nature-of-its-external-interactions-2013-e-g-business-community-or-sector-supply-chain-partner-organisations-government-customers Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/describe-the-strategic-nature-of-the-risks-faced-by-your-organisation-and-its-primary-concerns-regarding-risk-mitigation Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/describe-your-risk-management-approach-within-the-organisation-including-risk-assessment-and-risk-mitigation-and-the-risk-appetite-of-the-business Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/describe-your-risk-management-approach-outside-the-organisation-including-risk-assessment-and-risk-mitigation-and-the-risk-appetite-of-the-business Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/could-the-method-be-considered-as-cross-sectorial-i-e-could-it-be-applied-to-different-industry-sectors Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/do-you-think-it-is-technology-neutral Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/in-your-opinion-is-it-easily-applicable-to-smes Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-include-a-link-with-organizations-objectives-or-strategy Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-include-a-way-to-identify-critical-information-assets Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-consider-vulnerabilities Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-include-threat-sources-actors Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/and-likelihood-of-attack-compromise Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-provide-a-ways-for-2018calculate2019-risk-appetites-thresholds Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-include-a-method-best-practice-for-risk-evaluation Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/and-for-risk-reporting Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-include-a-catalogue-of-mitigation-mechanisms-for-risks Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-provide-alternatives-for-risk-monitoring-audit-compliance-and-governance Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-consider-a-supply-chain-perspective Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/5-based-on-your-knowledge-of-risk-management-methods-please-provide-the-following-feedback-please-feel-free-to-include-as-many-columns-as-you-need-and-the-comments-you-wish-for-each-of-them/does-it-include-the-dependencies-with-external-services-and-providers-customers Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/6-in-your-opinion-what-are-the-key-elements-that-a-risk-management-methodology-should-include-in-order-to-be-used-for-any-kind-of-organization-from-critical-infrastructure-operator-to-smes-please-provide-them-in-priority-order Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/7-regarding-critical-infrastructure-protection-some-organizations-are-switching-from-risk-analysis-to-impact-analysis-for-taking-cyber-security-decisions Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/as-a-predictive-technique-risk-analysis-on-its-own-has-been-shown-not-to-be-effective-for-preventing-any-incident-organizations-could-suffer-black-swans-2013rare-or-unexpected-events-are-more-difficult-to-rationalized-and-treat2013-or-new-threats Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/in-your-opinion-should-risk-analysis-be-complemented-with-other-techniques-to-improve-levels-of-cyber-security-if-you-think-so-which-techniques-could-complement-risk-analysis-to-improve-cyber-security-levels Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/using-different-risk-management-methodologies-will-normally-lead-to-levels-of-risk-that-are-difficult-to-compare Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/what-recognised-standards-or-frameworks-listed-above-does-your-organisation-use-to-assess-and-mitigate-risks Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/what-is-your-experience-how-effective-are-these-standards-frameworks-at-assessing-and-mitigating-your-internal-and-external-risks Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/if-there-was-a-framework-for-risk-assessment-and-risk-mitigation-what-would-201cgood201d-look-like Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/what-gaps-exist-and-what-improvements-need-to-be-made-to-these-standards-frameworks-to-address-your-risks-more-effectively Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/does-your-organisation-use-one-of-the-following-frameworks-or-one-equally-as-effective-if-not-how-do-you-mitigate-for-risks-that-less-effective-frameworks-do-not-address Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/describe-any-potential-or-perceived-barriers-to-the-adoption-of-best-practices-for-risk-management-particularly-in-support-of-the-eu-cyber-security-strategy-which-you-believe-need-to-be-addressed Disallow: https://resilience.enisa.europa.eu/nis-platform/shared-documents/survey-of-risk-management-methods-frameworks-and-capability-maturity-models-for-the-eu-network-information-security-platform/17-does-your-organisation-use-a-risk-management-capability-maturity-model-based-on-standards-if-so-which-one-s-if-not-what-would-you-require-from-a-capability-maturity-model-to-use-it-for-your-organisation-or-community Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/mailer Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/replyto Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/comments Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/thank-you Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/copy_of_mailer Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/title-1 Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/copy_of_topic Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/affiliation Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/copy_of_thank-you Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/ics-sg Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/stakeholder-representation-1 Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/short-summary-of-your-experience-in-the-ics-security-area Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/upload-cv Disallow: https://resilience.enisa.europa.eu/iot-security-experts-group-1/iotsec-application-form/please-enter-the-characters-you-see-below # Add Googlebot-specific syntax extension to exclude forms # that are repeated for each piece of content in the site # the wildcard is only supported by Googlebot # http://www.google.com/support/webmasters/bin/answer.py?answer=40367&ctx=sibling User-Agent: Googlebot Disallow: /*sendto_form$ Disallow: /*folder_factories$ Disallow: /*contactForm$