tag:www.gov.uk,2005:/search/policy-papers-and-consultationsPolicy papers and consultations from National Cyber Security Centre (NCSC)2025-04-08T00:00:00+01:00HM Governmenttag:www.gov.uk,2005:/government/publications/cyber-governance-code-of-practice2025-04-08T00:00:00+01:00Cyber Governance Code of PracticeThis Code of Practice and wider governance package shows boards and directors how to manage digital risks and protect their businesses and organisations from cyber attacks.tag:www.gov.uk,2005:/government/publications/the-second-uk-nigeria-security-and-defence-partnership-dialogue-communique2024-02-14T14:57:21+00:00The second UK-Nigeria Security and Defence Partnership Dialogue CommuniqueThe second UK-Nigeria Security and Defence Partnership Dialogue held at the office of the National Security Adviser in Abuja, from 7 to 8 February 2024.tag:www.gov.uk,2005:/government/publications/conflict-stability-and-security-fund-cyber-annual-review-summaries-2020-to-20212023-05-22T13:44:11+01:00Conflict, Stability and Security Fund: Cyber annual review summaries 2020 to 2021This page provides the annual review summaries for the Conflict, Stability and Security Fund (CSSF) programmes in Cyber.tag:www.gov.uk,2005:/government/publications/conflict-stability-and-security-fund-cyber-programme-summary-2020-to-20212023-05-19T12:14:00+01:00Conflict, Stability and Security Fund: Cyber programme summary 2021 to 2022This page includes the summaries of the Conflict, Stability and Security Fund (CSSF) Cyber programmes.tag:www.gov.uk,2005:/government/publications/conflict-stability-and-security-fund-cyber-and-tech-programme-summary-2020-to-20212021-07-15T14:00:00+01:00Conflict, Stability and Security Fund: Cyber and Tech programme summary 2020 to 2021This page includes the summary of the Conflict, Stability and Security Fund (CSSF) Cyber and Tech programme.tag:www.gov.uk,2005:/government/publications/interim-cyber-security-science-and-technology-strategy2017-11-30T11:00:13+00:00Interim cyber security science and technology strategyAn interim strategy for future-proofing cyber security.