<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Wim Mees</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Enhanced Collaboration for Cyber Security and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">Collaborative Network Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber digital skills</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">human factor</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">threat intelligence</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">7-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the structure and content of articles accepted for presentation at the Fourth International Scientific Conference “Digital Transformation, Cyber Security and Resilience, DIGILIENCE 2022. The volume includes articles presenting results on six particular topics: Advanced Threat Intelligence and Information Sharing; Digitalization and Privacy Preservation; Governing Cybersecurity Networks and Ecosystems; Developing Critical Cyber Skills; Human Factors for Safety and Resilience to Cyber/Hybrid Influence; and Cyber Ranges, Simulation and Training.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Georgi Penchev</style></author><author><style face="normal" font="default" size="100%">Antoniya Shalamanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Governance Model for an EU Cyber Security Collaborative Network – ECSCON</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Collaborative Network Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">Cyber security community</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">innovation management</style></keyword><keyword><style  face="normal" font="default" size="100%">Virtual Breeding Environment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">99-113</style></pages><abstract><style face="normal" font="default" size="100%">This white paper on governance of European Cyber Security Collaborative Network (ECSCON) is proposed as a joint effort between the four pilot projects ECHO, SPARTA, CONCORDIA and CyberSec4Europe to identify the &quot;umbrella&quot; model for effective and efficient coordination of the development of the European cyber security competence community in the institutional framework established by a European cybersecurity hub with a network of cybersecurity competence centres and in relation to EC, EUMS, ENISA, EDA, EURОPOL, and the NATO Cyber Organization. The white paper combines findings from bottom-up research in CyberSec4Europe and SPARTA with the top-down approach implemented by ECHO and will seek further cooperation with ECSO and Cyber Atlas to achieve a common proposal to the EC and offer to the European cyber security competence community to be self-organized on regional and functional principle. The proposed governance model defines the CNO as a Virtual organisations Breeding Environment to support the establishment of service groups to address specific demand, maintaining a regional (chapter based) organization of the community with a central hub dealing with EC and chapters dealing with the hub and national coordination centres in the respective member-states.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">99</style></section></record></records></xml>