| | CYBER(18)13e002 | Reply LS on new work item "X.5Gsec-q" | Available | 3GPP SA 3 | LSin |
| | CYBER(18)014045 | Draft - DTS/CYBER-0027-3 v0.0.14 (TS 103 523-3 ) "MSP for TLS at data centres" | Accepted | NCSC | Draft |
| | CYBER(18)014044 | Draft - DTS/CYBER-0027-3 v0.0.13 (TS 103 523-3 ) "MSP for TLS at data centres" | Noted | NCSC | Draft |
| | CYBER(18)014043 | Cyber Security for Consumer Internet of Things | Noted | DCMS | Draft |
| | CYBER(18)014042 | Draft - DTS/CYBER-0027-3 v0.0.12 (TS 103 523-3 ) "MSP for TLS at data centres" | Noted | NCSC | Draft |
| | CYBER(18)014041 | Presentation from CIPSEC Project and discussion on potential synergies with DTS/CYBER-0024 | Available | ETSI | Other |
| | CYBER(18)014040r2 | SmartM2M activity in security and privacy | Accepted | Cadzow Communications | LSout |
| | CYBER(18)014040r1 | SmartM2M activity in security and privacy | Revised | Cadzow Communications | LSout |
| | CYBER(18)014040 | SmartM2M activity in security and privacy | Revised | Cadzow Communications | LSout |
| | CYBER(18)014039 | EU Cybersecurity Incidents Taxonomy (re Blueprint) | Available | SBS aisbl | Other |
| | CYBER(18)014038 | CYBER-0027-1v0017 | Noted | NCSC | Draft |
| | CYBER(18)014037 | Proposal to establish a European Coordination Group for aviation cybersecurity-related standardisation matters | Available | ETSI | Other |
| | CYBER(18)014036 | Draft - DTS/CYBER-0019 v0.0.11 (TS 103 457 ) "Common interface to transfer sensitive functions to a trusted domain." | Accepted | Bull SAS | Draft |
| | CYBER(18)014035 | Draft - DTS/CYBER-0019 v0.0.10(TS 103 457 ) "Common interface to transfer sensitive functions to a trusted domain." | Noted | Bull SAS | Draft |
| | CYBER(18)014034 | Status of EC expert group on Reconfigurable Radio Systems | Available | IBIT Ambrosini | Other |
| | CYBER(18)014033 | EC continuously open call for new expert group on Radio Equipment Directive | Available | IBIT Ambrosini | Other |
| | CYBER(18)014032 | Motivation for NWI proposal Interface between data protection compliance management systems and IT systems | Available | IBIT Ambrosini | Other |
| | CYBER(18)014031 | Interface between data protection compliance management systems and IT systems | Available | IBIT Ambrosini | NWI |
| | CYBER(18)014030r1 | Update of TS 103 532 for conformance and interoperability testing | Accepted | IBIT Ambrosini | NWI |
| | CYBER(18)014030 | Update of TS 103 532 for conformance and interoperability testing | Revised | IBIT Ambrosini | NWI |
| | CYBER(18)014029 | Summary notes on where we are with WI-24 | Reserved | Cadzow Communications | Other |
| | CYBER(18)014028 | Summary notes on where we are with WI-22 | Reserved | Cadzow Communications | Other |
| | CYBER(18)014027 | Summary notes on where we are with WI-14 | Reserved | Cadzow Communications | Other |
| | CYBER(18)014026 | Summary notes on where we are with WI-13 | Reserved | Cadzow Communications | Other |
| | CYBER(18)014025r1 | Informal report on work in SmartM2M on IoT Security and Privacy | Available | Cadzow Communications | Other |
| | CYBER(18)014025a1 | SmartM2M draft of TR 103 533 | Available | Cadzow Communications | Other |
| | CYBER(18)014025 | Informal report on work in SmartM2M on IoT Security and Privacy | Revised | Cadzow Communications | Other |
| | CYBER(18)014024 | Cyber Security for Consumer Internet of Things | Noted | DCMS | Draft |
| | CYBER(18)014023 | Draft - DTS/CYBER-0027-2 v0.0.9 (TS 103 523-2 ) "Middlebox - Part 2 TLMSP" | Noted | ADVENICA AB | Draft |
| | CYBER(18)014022 | Draft - DTS/CYBER-0027-3 v0.0.9 "MSP for TLS at data centres" | Withdrawn | NCSC | Draft |
| | CYBER(18)014021 | Motivation for the NWI proposal External encodings for the Advanced Encryption Standard | Available | Irdeto BV | Other |
| | CYBER(18)014020r1 | External encodings for the Advanced Encryption Standard | Accepted | Irdeto BV | NWI |
| | CYBER(18)014020 | External encodings for the Advanced Encryption Standard | Revised | Irdeto BV | NWI |
| | CYBER(18)014019 | Critical Security Controls for MSP Enabled Middleboxes | Accepted | CIS | NWI |
| | CYBER(18)014018 | CYBER-033 Procedures for Digital Evidence v0.1.1 | Available | Tencastle Limited | Other |
| | CYBER(18)014017 | Stable Draft DTS/CYBER-0019 v0.0.10 (TS 103 457) "Common interface to transfer sensitive functions to a trusted domain." | Noted | Bull SAS | Draft |
| | CYBER(18)014016 | QSC#8 report | Available | Approach Infinity | Report |
| | CYBER(18)014015 | Draft - DTS/CYBER-0027-3 v0.0.8 "MSP for TLS at data centres" | Withdrawn | NCSC | Draft |
| | CYBER(18)014014 | Draft - DTR/CYBER-0029 v0.0.3 "Security techniques for protecting software in a white box model" | Withdrawn | Gemalto N.V. | Draft |
| | CYBER(18)014013 | TC RRS related to the EC Expert Group on Reconfigurable Radio Systems | Available | RRS | LSin |
| | CYBER(18)014012 | LS SG 17 work item X.framcdc: Framework for the creation and operation of a Cyber Defence Center to ETSI TC Cyber | Available | ITU-T | LSin |
| | CYBER(18)014011 | LS SG17 work item X.5Gsec-q: Security guidelines for applying quantum-safe algorithms in 5G systems to ETSI TC Cyber and 3GPP SA3 | Available | ETSI | LSin |
| | CYBER(18)014010 | CYBER roadmap | Available | ETSI | Other |
| | CYBER(18)014009 | Latest version of EC ICT Rolling Plan 2019 | Reserved | ETSI | Other |
| | CYBER(18)014007 | Proposal for new Draft 103 523-3 Part 3 Annex: Requirements for an eTLS Aware client | Available | Netscout Systems Inc. | Other |
| | CYBER(18)014006 | Liaison about ETSI MTS TST | Available | MTS TST | LSin |
| | CYBER(18)014005 | Call for Inputs to EC Expert Group (6th Meeting) on RRS | Available | RRS | LSin |
| | CYBER(18)014004 | LS from ISO/IEC JTC 1/SC 27/WG2 and WG5 | Available | ISO/IEC JTC 1 SC 27 | LSin |
| | CYBER(18)014003 | LS from JTC 1/SC 27/WG 4 to ETSI | Available | ISO/IEC JTC 1 SC 27 WG4 | LSin |
| | CYBER(18)014002 | CYBER#14 report | Accepted | Chairman | Report |
| | CYBER(18)014001r4 | CYBER#14 agenda | Available | Chairman | Agenda |
| | CYBER(18)014001r3 | CYBER#14 agenda | Revised | Chairman | Agenda |
| | CYBER(18)014001r2 | CYBER#14 agenda | Revised | Chairman | Agenda |
| | CYBER(18)014001r1 | CYBER#14 agenda | Revised | Chairman | Agenda |
| | CYBER(18)014001 | CYBER#14 agenda | Revised | Chairman | Agenda |
| | CYBER(18)000085 | Draft - DTR/CYBER-0037 v0.0.2 (TR 103 644 ) "Smart meter security guidelines" | Noted | ISMB | Draft |
| | CYBER(18)000084 | Draft - DTS/CYBER-0027-3 v0.0.11 (TS 103 523-3 ) "MSP for TLS at data centres" | Noted | NCSC | Draft |
| | CYBER(18)000083 | Draft - DTS/CYBER-0027-3 v0.0.10 (TS 103 523-3 ) "MSP for TLS at data centres" | Noted | NCSC | Draft |
| | CYBER(18)000082 | Draft - DTR/CYBER-0029 v0.0.6 (TR 103 642 ) "Security techniques for protecting software in a white box model" | Accepted | Gemalto N.V. | Draft |
| | CYBER(18)000081 | Draft - DTR/CYBER-0037 v0.0.1 (TR 103 644 ) "Smart meter security guidelines" | Noted | ISMB | Draft |
| | CYBER(18)000080r1 | eTLS implementation | Available | Netscout Systems Inc. | Other |
| | CYBER(18)000080 | eTLS implementation | Revised | Netscout Systems Inc. | Other |
| | CYBER(18)000079r2 | CYBER-0027-1v0016 | Noted | NCSC | Draft |
| | CYBER(18)000079r1 | CYBER-0027-1v0015 | Revised | NCSC | Draft |
| | CYBER(18)000078 | Draft - DTR/CYBER-0029 v0.0.5 "Security techniques for protecting software in a white box model" | Noted | Gemalto N.V. | Draft |
| | CYBER(18)000077 | Draft - DTR/CYBER-0029 v0.0.4 "Security techniques for protecting software in a white box model" | Withdrawn | Gemalto N.V. | Draft |