| | CYBER(18)012059 | Status on middlebox hackathon | Available | NCSC | Other |
| | CYBER(18)012058 | TC CYBER and GDPR - input for brainstorming | Available | ETSI | Other |
| | CYBER(18)012057 | History of security in ETSI | Available | Zeata Security Ltd | Other |
| | CYBER(18)012056 | Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of Things | Available | CNIT | LSout |
| | CYBER(18)012055 | CYBER roadmapping brainstorming results | Available | ISARA | Other |
| | CYBER(18)012054 | WI-27-30 report | Available | ADVENICA AB | Other |
| | CYBER(18)012053r1 | Meeting report from WG QSC to TC Cyber plenary | Available | Approach Infinity | Report |
| | CYBER(18)012053 | Meeting report from WG QSC to TC Cyber plenary | Revised | Approach Infinity | Report |
| | CYBER(18)012052 | Draft DTS/CYBER-0019 v0.0.6 TS 103 457 Common interface to transfer sensitive functions to a trusted domain | Noted | Bull SAS | Draft |
| | CYBER(18)012051 | Comments on final draft TS 103 532 | Available | ETSI | Other |
| | CYBER(18)012050 | Draft - DTS/CYBER-0024 v0.0.2 "Metrics for Identification of CI" | Available | Cadzow Communications | Draft |
| | CYBER(18)012049 | Quantum-Safe Identity-Based Encryption | Accepted | NCSC | NWI |
| | CYBER(18)012048 | Migration strategies and recommendations to Quantum-Safe schemes | Accepted | Cadzow Communications | NWI |
| | CYBER(18)012047 | Draft - DTS/CYBER-0014 v0.0.9 (TS 103 486 ) "Identity management and naming schema protection mechanisms" | Noted | Cadzow Communications | Draft |
| | CYBER(18)012046 | Summary report of smartM2M meeting | Available | Cadzow Communications | Other |
| | CYBER(18)012045r1 | Checklist of TC CYBER related standards venues | Available | CIS | Other |
| | CYBER(18)012045 | Checklist of TC CYBER related standards venues | Revised | CIS | Other |
| | CYBER(18)012044a1 | Addendum to contribution 44 containing CIPSEC presentation | Available | Cadzow Communications | Other |
| | CYBER(18)012044 | Critical Infrastructure Protection project CIPSEC collaboration with CYBER | Available | Cadzow Communications | Other |
| | CYBER(18)012043 | Draft DTR/CYBER-0010 v0.0.5 TR 103 370 Practical introductory guide to privacy | Noted | KAT | Draft |
| | CYBER(18)012042 | ETSI standards in support of cybersecurity certification | Available | ETSI | Other |
| | CYBER(18)012041 | proposals for Delegated Acts for data security & privacy within RED directive | Available | ETSI | Other |
| | CYBER(18)012040 | CEN-CENELEC position paper on Cybersecurity Regulation | Available | ETSI | Other |
| | CYBER(18)012039 | ETSI position paper on Cybersecurity Regulation | Available | ETSI | Other |
| | CYBER(18)012038 | Proposed Cybersecurity Regulation | Available | ETSI | Other |
| | CYBER(18)012037 | Draft - RTS/CYBER-0022 v4.2.2 (TS 102 165-2 ) "Methods and Protocols for Security Part 2: Counter Measures" | Available | Cadzow Communications | Draft |
| | CYBER(18)012036 | Draft - RTS/CYBER-0022 v4.2.2 (TS 102 165-2 ) "Methods and Protocols for Security Part 2: Counter Measures" | Withdrawn | Cadzow Communications | Draft |
| | CYBER(18)012035 | Survey of MSP related platforms | Available | CIS | Other |
| | CYBER(18)012034 | Draft - DTS/CYBER-0027-1 v0.0.11 (TS 103 523-1 ) "Middlebox - Part 1" | Noted | ADVENICA AB | Draft |
| | CYBER(18)012033 | DTS-020 comment disposition | Available | CNIT | Other |
| | CYBER(18)012032r1 | STF 529 Final Report | Accepted | CNIT | Other |
| | CYBER(18)012032 | STF 529 Final Report | Revised | CNIT | Other |
| | CYBER(18)012031r4 | Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model" | Noted | Gemalto N.V. | Draft |
| | CYBER(18)012031r3 | Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model" | Withdrawn | Gemalto N.V. | Draft |
| | CYBER(18)012031r2 | Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model" | Withdrawn | Gemalto N.V. | Draft |
| | CYBER(18)012031r1 | Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model" | Revised | Gemalto N.V. | Draft |
| | CYBER(18)012031 | Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model" | Revised | Gemalto N.V. | Draft |
| | CYBER(18)012030 | Draft - DTS/CYBER-0027-2 v0.0.6 (TS 103 523-2 ) "Middlebox - Part 2" | Noted | ADVENICA AB | Draft |
| | CYBER(18)012029 | Draft - DTS/CYBER-0027-1 v0.0.10 (TS 103 523-1 ) "Middlebox - Part 1" | Noted | ADVENICA AB | Draft |
| | CYBER(18)012028 | Review of recent activity in CI identification | Withdrawn | Cadzow Communications | Other |
| | CYBER(18)012027r1 | Review of necessary updates to TS 102 165-2 | Available | Cadzow Communications | Other |
| | CYBER(18)012027 | Review of necessary updates to TS 102 165-2 | Revised | Cadzow Communications | Other |
| | CYBER(18)012026 | Distributed ledger techniques in Identity Protection | Available | Cadzow Communications | Other |
| | CYBER(18)012025 | Role of SAREF in Identity Management | Available | Cadzow Communications | Other |
| | CYBER(18)012024 | Work item 14v008 | Noted | Cadzow Communications | Draft |
| | CYBER(18)012023 | Work item 14v007 | Noted | Cadzow Communications | Draft |
| | CYBER(18)012022 | Update on work item 14 - Identity Management | Available | Cadzow Communications | Other |
| | CYBER(18)012021 | Draft - DTS/CYBER-0020 v0.0.15 (TS 103 458 ) "Application of ABE for data protection on smart devices, cloud and mobile services" | Noted | CNIT | Draft |
| | CYBER(18)012020r1 | Demonstration of CP-WATERS-KEM scheme | Available | IBIT Ambrosini | Other |
| | CYBER(18)012020 | Demonstration of CP-WATERS-KEM scheme | Revised | IBIT Ambrosini | Other |
| | CYBER(18)012019 | Contribution to DTS-025 from stakeholders | Available | CNIT | Other |
| | CYBER(18)012018 | Supporting material for new work item on assuring digital evidence | Available | Tencastle Limited | Other |
| | CYBER(18)012017r1 | Report on techniques for assurance of ?digital ?material used in legal proceedings. | Accepted | Tencastle Limited | NWI |
| | CYBER(18)012017 | Report on techniques for assurance of ?digital ?material used in legal proceedings. | Revised | Tencastle Limited | NWI |
| | CYBER(18)012016 | 5G Security Overview | Available | Tencastle Limited | Other |
| | CYBER(18)012015 | Text for TS 103 523-3, Part 3: Profile for data centre TLMSP | Available | CIS | Other |
| | CYBER(18)012014r1 | Draft - DTS/CYBER-0025 v0.0.6 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control" | Accepted | CNIT | Draft |
| | CYBER(18)012014 | Draft - DTS/CYBER-0025 v0.0.6 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control" | Revised | CNIT | Draft |
| | CYBER(18)012013 | Final revised draft TS 103 307 v1.2.4 Security Aspects for LI and RD Interfaces | Accepted | Tencastle Limited | Draft |
| | CYBER(18)012012r1 | Changes to TR103331 Structured threat information sharing | Accepted | CIS | NWI |
| | CYBER(18)012012 | Changes to TR103331 Structured threat information sharing | Revised | CIS | NWI |
| | CYBER(18)012011a1 | Full PDF text of ETL 2017 | Available | Cadzow Communications | Other |
| | CYBER(18)012011 | ENISA Threat Landscape Report and Web-App | Available | Cadzow Communications | Other |
| | CYBER(18)012010 | Disposition of comments received from JTC8 on TR 103-370 | Available | KAT | Other |
| | CYBER(18)012009 | EC presentation to MSP on cybersecurity package | Available | ETSI | Other |
| | CYBER(18)012008a2 | SC 27 WG5 roadmap | Available | ETSI | Other |
| | CYBER(18)012008a1 | CD 27552 extension to 27001 and 27002 for privacy management | Available | ETSI | Other |
| | CYBER(18)012008 | Notes from ISO/IEC JTC 1 SC 27 meeting | Available | ETSI | Other |
| | CYBER(18)012007 | CEN/CLC JTC8 comments on ETSI Draft TR 103 370 | Available | CEN/CLC JTC8 | Other |
| | CYBER(18)012006 | LSOut reply to TC Cyber Common interface to transfer sensitive functions to a trusted domain | Available | NFV SEC | LSin |
| | CYBER(18)012005r1 | CR to version 1.2.1 of TS 103 307 showing changes made on call in yellow | Accepted | Tencastle Limited | CR |
| | CYBER(18)012005 | CR to version 1.2.1 of TS 103 307 | Revised | Tencastle Limited | CR |
| | CYBER(18)012004 | LS Call for Inputs to EC Expert Group on RRS | Available | RRS | LSin |
| | CYBER(18)012003 | NGMN Paper on 5G End-to-End Architecture Framework | Available | ETSI | LSin |
| | CYBER(18)012002 | CYBER#12 report | Accepted | ETSI | Report |
| | CYBER(18)012001r4 | CYBER#12 agenda | Available | ETSI | Agenda |
| | CYBER(18)012001r3 | CYBER#12 agenda | Revised | ETSI | Agenda |
| | CYBER(18)012001r2 | CYBER#12 agenda | Revised | ETSI | Agenda |
| | CYBER(18)012001r1 | CYBER#12 agenda | Revised | ETSI | Agenda |
| | CYBER(18)012001 | CYBER#12 agenda | Revised | ETSI | Agenda |
| | CYBER(18)000024 | LS to ITU-T SG17 LS70 about Middlebox work items in TC Cyber | Available | NCSC | LSout |
| | CYBER(18)000023 | Disposition of comments received from JTC8 on TR 103-370 | Available | KAT | Other |
| | CYBER(18)000022r1 | Facilitating the uptake of cybersecurity standards | Available | NCSC | LSout |
| | CYBER(18)000022 | Facilitating the uptake of cybersecurity standards | Revised | NCSC | LSout |
| | CYBER(17)000143 | Update to TS 103 307 Annex A.3 | Accepted | Tencastle Limited | NWI |