<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dinos Kerigan-Kyrou</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">2020 Transatlantic Security Jam: Resilience Going Forward</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">47-54</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The 2020 Transatlantic Security Jam brought together military professionals and experts from a wide range of related disciplines. Their goal was to discuss and to analyze how NATO and its partners, including the European Union, can develop and enhance capabilities to address new and emerging security challenges. The online Security Jam took place soon after the start of one of the greatest asymmetric challenges we have seen &amp;ndash; the COVID-19 pandemic. The pandemic has challenged every assumption on what is meant by security and resilience that we have had since the end of the Second World War. With this in mind, the participants proposed how we can both adapt to and proactively foresee emerging security challenges now and in the future. This article summarizes the discussions which took place and the proposals put forward. These proposals include a much more holistic approach to addressing security challenges that transcend the traditional &amp;lsquo;siloed&amp;rsquo; or &amp;lsquo;compartmentalized&amp;rsquo; approach we have grown so accustomed to.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">47</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sean S. Costigan</style></author><author><style face="normal" font="default" size="100%">Michael A. Hennessy</style></author><author><style face="normal" font="default" size="100%">Scott Knight</style></author><author><style face="normal" font="default" size="100%">Dinos Kerigan-Kyrou</style></author><author><style face="normal" font="default" size="100%">Philip Lark</style></author><author><style face="normal" font="default" size="100%">Chris Pallaris</style></author><author><style face="normal" font="default" size="100%">Daniel Peder Bagge</style></author><author><style face="normal" font="default" size="100%">Gigi Roman</style></author><author><style face="normal" font="default" size="100%">Natalia Spinu</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Ronald Taylor</style></author><author><style face="normal" font="default" size="100%">Joseph Vann</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity: A Generic Reference Curriculum</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">National Defence</style></publisher><pub-location><style face="normal" font="default" size="100%">Kingston, ON</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;The reference curriculum on cybersecurity may be used by educators as a generic guide for implementing a cybersecurity program. It is organized alnf four maun themes: &lt;/span&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;Cyberspace and the Fundamentals of Cybersecurity &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;Risk Vectors Theme&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;International Cybersecurity Organizations, Policies and Standards&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;Cybersecurity Management in the National Context &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;The full text of the Cybersecurity Curriculum is available for free download on the NATO website &lt;a href=&quot;http://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_10/20161025_1610-cybersecurity-curriculum.pdf&quot; target=&quot;_blank&quot; title=&quot;Cybersecurity: A Generic Reference Curriculum &quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dinos Kerigan-Kyrou</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Energy Infrastructure: Operators, NATO, and Facing Future Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">109-117</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">109</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Критическая энергетическая инфраструктура: операторы, НАТО  и будущие вызовы</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Лето 2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">129-140</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">129</style></section></record></records></xml>