<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pavel Varbanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Perspectives in the Design of a Modern  Cybersecurity Training Programme: The ECHO Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competencies</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity skills</style></keyword><keyword><style  face="normal" font="default" size="100%">design</style></keyword><keyword><style  face="normal" font="default" size="100%">framework</style></keyword><keyword><style  face="normal" font="default" size="100%">training program</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">177-190</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper leverages the training and education-related research outputs developed under the ECHO project. They are compared to the progress of the workgroups in ENISA (European Union Agency for Cybersecurity) and ECSO (European Cybersecurity Organization) that classify, structure and define the competencies, skills, and knowledge and risk factors. The approach digested by the ECHO project explores the methods for achieving a more vital balance between the market demands and talent supply. The scope of the research activities covers four main and interconnected components – i) Contextualization; ii) Competences; iii) Generic Curriculum; iv) Assessment methodology. The proposed approach explores and gradually builds upon the generic definitions of the skills and knowledge toward specific requirements on what an ICT or cybersecurity professional must know and be able to do in order to implement initial and further cyber-incident response actions. The paper considers mainly the design methods for building cybersecurity training programs for professionals. Still, it could be applied in academic settings as well, enriching the academic programs with practical learning experiences. Several examples are provided to demonstrate the relevance and applicability of the proposed methods.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">177</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Pavel Varbanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">certification</style></keyword><keyword><style  face="normal" font="default" size="100%">Ethics</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">lawfulness</style></keyword><keyword><style  face="normal" font="default" size="100%">robust AI</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">trustworthy AI</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">11-22</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Within recent years, governments in the EU member states have put increasing efforts into managing the scope and speed of socio-technical transformations due to rapid advances in Artificial Intelligence (AI). With the expanding deployment of AI in autonomous transportation, healthcare, defense, and surveillance, the topic of ethical and secure AI is coming to the forefront. However, even against the backdrop of a growing body of technical advancement and knowledge, the governance of AI-intensive technologies is still a work in progress facing numerous challenges in balancing between the ethical, legal and societal aspects of AI technologies on the one hand and investment, financial and technological on the other. Guaranteeing and providing access to reliable AI is a necessary prerequisite for the proper development of the sector. One way to approach this challenge is through governance and certification. This article discusses initiatives supporting a better understanding of the magnitude and depth of adoption of AI. Given the numerous ethical concerns posed by unstandardized AI, it further explains why certification and governance of AI are a milestone for the reliability and competitiveness of technological solutions.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>