loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Artur Rot and Bartosz Blaicke

Affiliation: Department of Information Systems, Wroclaw University of Economics, Wroclaw and Poland

Keyword(s): Security, Cybersecurity, Transformation, Investment, Budget, Risk-based Approach.

Related Ontology Subjects/Areas/Topics: Computer-Supported Education ; Enterprise Information Systems ; Information Systems Analysis and Specification ; Information Technologies Supporting Learning ; Security ; Security and Privacy ; Tools, Techniques and Methodologies for System Development

Abstract: The purpose of this paper is to propose a proprietary methodology and model to generate a “cybersecurity transformation workplan” for large organizations that can improve their cybersecurity posture. The key input is based on risk-based assessment or maturity-based questionnaires depending on existing governance processes and available information. The original scoring can be then used to prioritize a portfolio of all possible initiatives by selecting the ones that are missing from typical foundation elements or would have high potential impact in relation to required investment and effort. Additional constraints such as budget limitation and FTE availability, logical sequencing and time requirements could be added to ensure effective use of company resources and actionability of the recommendations. The Gantt-like output would ease the burden on the security teams by providing an individualized set of activities to be implemented to improve risk posture.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.118.9.7

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Rot, A. and Blaicke, B. (2019). Towards Automated Modelling of Large-scale Cybersecurity Transformations: Potential Model and Methodology. In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS; ISBN 978-989-758-372-8; ISSN 2184-4992, SciTePress, pages 345-350. DOI: 10.5220/0007763703450350

@conference{iceis19,
author={Artur Rot. and Bartosz Blaicke.},
title={Towards Automated Modelling of Large-scale Cybersecurity Transformations: Potential Model and Methodology},
booktitle={Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS},
year={2019},
pages={345-350},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007763703450350},
isbn={978-989-758-372-8},
issn={2184-4992},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS
TI - Towards Automated Modelling of Large-scale Cybersecurity Transformations: Potential Model and Methodology
SN - 978-989-758-372-8
IS - 2184-4992
AU - Rot, A.
AU - Blaicke, B.
PY - 2019
SP - 345
EP - 350
DO - 10.5220/0007763703450350
PB - SciTePress