Academic literature on the topic 'Cybersecurity risk management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity risk management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity risk management"
Eaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (March 1, 2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.
Full textBurrell, Darrell Norman. "Understanding Healthcare Cybersecurity Risk Management Complexity." Land Forces Academy Review 29, no. 1 (February 28, 2024): 38–49. http://dx.doi.org/10.2478/raft-2024-0004.
Full textBriscoe, Christopher, and Carl Young. "Scale, Complexity, and Cybersecurity Risk Management." Journal of Information Security 15, no. 04 (2024): 524–44. http://dx.doi.org/10.4236/jis.2024.154029.
Full textOlawoyin, Olayinka Michael. "Blockchain Technology in Risk Management: Strengthening Cybersecurity and Financial Integrity." International Journal of Research Publication and Reviews 5, no. 10 (October 2024): 2336–48. http://dx.doi.org/10.55248/gengpi.5.1024.2829.
Full textAdebayo Omowunmi Temitope, LawalYusufAdedayo, and Braimoh Kareem. "Cybersecurity risk management in agile development: protecting data and system." International Journal of Science and Research Archive 8, no. 1 (February 28, 2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.
Full textKeskin, Omer F., Kevin Matthe Caramancion, Irem Tatar, Owais Raza, and Unal Tatar. "Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports." Electronics 10, no. 10 (May 13, 2021): 1168. http://dx.doi.org/10.3390/electronics10101168.
Full textLi, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.
Full textChebib, Tom. "Digital Identity: A Human-Centered Risk Awareness Study." Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.
Full textKure, Halima Ibrahim, and Shareeful Islam. "Assets focus risk management framework for critical infrastructure cybersecurity risk management." IET Cyber-Physical Systems: Theory & Applications 4, no. 4 (December 1, 2019): 332–40. http://dx.doi.org/10.1049/iet-cps.2018.5079.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textDissertations / Theses on the topic "Cybersecurity risk management"
Rassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.
Full textThe global digital network, with its ability to communicate directly and in real time between people in every part of the planet, is a formidable tool to develop relationships and realize exchange of information and knowledge. In cyberspace they coexist people of all kinds, characterized by different interests, different cultures and different ways of relating to others. From an economic point of view, the global network has become a formidable transactional tool for the exchange of goods and services and there is the commercial and industrial sector that has not arrived in some way in cyberspace. The cybernetic revolution, induced by new and increasingly powerful electronic and computer technologies, it is not limited to connect the network, almost all of the planet's surface but is rapidly expanding to the direct control of myriad physical devices of the most varied , from Smartphone to wearable devices, from city traffic control to the electricity production and distribution infrastructure systems. And 'the SO-CALLED "Internet of Things" and the Internet of things, the network that interconnects all electronic devices capable of communicating with the outside world. A pervasive who did not spare the public sector which, first, is called on to provide answers on many fronts, not least regulatory, and as far as possible, ensure compliance with the rules in the real world even in cyberspace. In particular, the public sector must take responsibility to ensure the physical and cyber security of SO-CALLED National Critical Infrastructure, including all the essential services for national security, the proper functioning of the country and its economic growth and, not least, the well-being of the population. Are Critical Infrastructures electric and energy system, communication networks in general, networks and transport infrastructure of people and goods (ship, rail, air and road), the public health system, economics and financial channels, the national networks of government , regions, those for emergency management and civil protection. The challenge is complex and Public Administration alone seems unable to respond effectively to increasingly sophisticated cyber-attacks that day, affecting the civilian world, industrial and economic. NCI are not immune and, as a result, the Public Strategic Services are exposed to significant risks. On this issue, Western governments have long established close cooperation with the private sector, and highlighted the need to define a strategy and a shared modus operandi and quality between the various actors involved. This work aims to address systematically the "hot" topic of cyber security, an area that involves national governments, military, intelligence services, the economy and the business world as a whole and, gradually and in various capacities and degree of interest, every single citizen of the world. In this unprecedented scenario, strongly characterized by uncertainty and variability of the virus, the application sic et simpliciter of "traditional" evaluation techniques of the corporate risk derivation is inadequate for this purpose, despite a certain degree of adaptation to the new scenario is already underway. The analysis focuses on the relative adaptive-evolution that is affecting the risk management in the field of cyber security and state of the art in the academic and scientific world views in the introduction of new and more advanced tools for analysis the Cyber Risk. The work ends with a case study of a large Italian company which provides a strategic public service such as electricity. [edited by author]
La rete digitale globale, con la sua capacità di stabilire contatti diretti e in tempo reale tra persone in ogni parte del pianeta, rappresenta uno strumento formidabile per sviluppare relazioni e realizzare scambio di informazioni e di conoscenza. Nel cyberspazio convivono persone di ogni tipo, caratterizzate da interessi diversi, culture differenti e diversi modi di relazionarsi con il prossimo. Dal punto di vista economico, la rete globale è oggi un formidabile strumento transazionale per lo scambio di beni e di servizi e non vi è settore commerciale e industriale che non sia approdato in qualche modo nel cyberspazio. La rivoluzione cibernetica, indotta dalle nuove e sempre più potenti tecnologie elettroniche e informatiche, non si è limitata a connettere in rete la quasi totalità della superficie del pianeta ma si sta rapidamente espandendo verso il controllo diretto di una miriade di dispositivi fisici tra i più vari, dagli Smartphone ai dispositivi indossabili, dai sistemi di controllo del traffico cittadino alle infrastrutture di produzione e distribuzione di energia elettrica. E’ la c.d. “Internet of Things” o Internet delle cose, che interconnette in rete tutti i dispositivi elettronici in grado di comunicare con il mondo esterno. Una pervasività che non ha risparmiato il settore pubblico che, in primo luogo, è chiamato a fornire risposte su numerosi fronti, non ultimo quello normativo, e, per quanto possibile, garantire il rispetto delle regole presenti nel mondo reale anche nello spazio cibernetico. In particolare, il settore pubblico deve farsi carico di garantire la sicurezza fisica e informatica delle c.d. infrastrutture critiche nazionali, che includono tutti quei servizi essenziali per la sicurezza nazionale, il buon funzionamento del Paese e la sua crescita economica e, non ultimo, il benessere della popolazione. Sono Infrastrutture Critiche il sistema elettrico ed energetico, le reti di comunicazione in genere, le reti e le infrastrutture di trasporto di persone e merci (navale, ferroviario, aereo e stradale), il sistema sanitario pubblico, i circuiti economici e finanziari, le reti del Governo nazionale, delle Regioni, quelle per la gestione delle emergenze e della Protezione Civile. La sfida è complessa e la Pubblica Amministrazione da sola non sembra in grado di poter rispondere in modo efficace agli attacchi informatici sempre più sofisticati che, quotidianamente, colpiscono il mondo civile, industriale ed economico. Le infrastrutture critiche nazionali non ne sono immuni e, di conseguenza, i Servizi Pubblici Strategici sono esposti a significativi rischi. Su questo tema, i Governi occidentali hanno da tempo avviato una stretta collaborazione con il settore privato, ed è emersa la necessità di definire una strategia e un modus operandi condiviso e di qualità tra i vari attori coinvolti. Questo lavoro si propone di affrontare in maniera sistematica il tema “caldo” della Cyber Security, un ambito che coinvolge governi nazionali, settori militari, servizi di informazione, il sistema economico e il mondo delle imprese nel suo complesso e, via via e a vario titolo e grado di interesse, ogni singolo cittadino del mondo. In questo scenario inedito, fortemente connotato da incertezza e variabilità delle minacce, l’applicazione sic et simpliciter delle tecniche “tradizionali” di valutazione del rischio di derivazione aziendale risulta inadeguata allo scopo, nonostante un certo grado di adattamento al nuovo scenario sia già in corso. L’analisi si concentra sulla parte relativa all’’evoluzione adattativa’ che sta interessando il risk management nel campo della cyber security e dello stato dell’arte nel panorama accademico e scientifico mondiale nell’introduzione di nuovi e più evoluti strumenti per l’analisi del Cyber Risk. Il lavoro si conclude con un caso di studio effettuato su di una grande azienda italiana che fornisce un servizio pubblico strategico quale l’energia elettrica. [a cura dell'autore]
XV n.s.
Steinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.
Full textBaker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.
Full textPh. D.
Gao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 92-107).
In the past two decades, the exponential growth of the modern Internet with the digitization of most human activities such as data gathering and storage have also fueled the growth of cybercrimes. In more recent years, the modern Internet is spreading into everyday life through the Internet of Things (IoT), which is further expanding the attack surface. Among all the IoT domains, the smart home, in particular, is poised to be one of the most exciting application areas of the IoT. However, behind the optimistic outlook, the shadow of an impending threat is also growing. Across the board, among the smart home device manufacturers, security is nearly non-existent or significantly downplayed. Consequently, the neglected, unresolved vulnerabilities in these devices widely expose their users and their family to cyberattacks. This thesis aims to illuminate the dynamics in the smart home market and their implications for IoT as a whole. First, it will review the past evolution of the IoT and the smart home along with current trends in enabling technologies. Next, through detailed examinations of four dynamic factors - i) macro pressures to innovate, 2) growing perils of cybercrimes, 3) vulnerabilities in the smart home, and 4) values at risk - the thesis seeks to elucidate the serious consequences of ignoring cybersecurity in the smart home system through causal loop diagramming. This thesis uses substantiated data from the past few years to justify its analyses. The thesis concludes that the smart home is an essential innovation that can help solve many urgent challenges facing our time, and securing the smart home devices is a key step towards building a safer and more secure IoT future as well as a future for the current generation and many generations to come.
by Olivia Qing Gao.
S.M. in Engineering and Management
Stefanska, Beata, and Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.
Full textArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Full textAbu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.
Full textTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Full textCurran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.
Full textMOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.
Full textBooks on the topic "Cybersecurity risk management"
Rohmeyer, Paul, and Jennifer L. Bayuk. Financial Cybersecurity Risk Management. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4194-3.
Full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Protecting the homeland from nuclear and radiological threats: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, July 29, 2014. Washington: U.S. Government Publishing Office, 2015.
Find full textStepping Through Cybersecurity Risk Management. Wiley & Sons, Limited, John, 2024.
Find full textStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Find full textStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Find full textStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Find full textOh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2021.
Find full textOh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2022.
Find full textKissoon, Tara. Optimal Spending on Cybersecurity Measures: Risk Management. Taylor & Francis Group, 2021.
Find full textBlokdyk, Gerardus. Cybersecurity Risk Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Find full textBook chapters on the topic "Cybersecurity risk management"
Jøsang, Audun. "Cyber Risk Management." In Cybersecurity, 405–28. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_19.
Full textRefsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Full textWatters, Paul A. "Risk Management." In Cybercrime and Cybersecurity, 16–27. New York: CRC Press, 2023. http://dx.doi.org/10.1201/9781003406730-2.
Full textKissoon, Tara. "Cybersecurity risk-management framework." In Optimal Spending on Cybersecurity Measures, 95–112. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-7.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures, 127–48. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-6.
Full textKissoon, Tara. "Risk-management practice – vulnerability management." In Optimal Spending on Cybersecurity Measures, 26–45. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-4.
Full textKaur, Gurdip, and Arash Habibi Lashkari. "Information Technology Risk Management." In Advances in Cybersecurity Management, 269–87. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71381-2_13.
Full textKaur, Gurdip, Ziba Habibi Lashkari, and Arash Habibi Lashkari. "Cybersecurity Risk in FinTech." In Understanding Cybersecurity Management in FinTech, 103–22. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79915-1_6.
Full textKissoon, Tara. "Risk-management practice – business continuity management." In Optimal Spending on Cybersecurity Measures, 68–94. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-6.
Full textBillois, Gérôme. "Cybersecurity Incident and Crisis Management." In The Cyber Risk Handbook, 171–84. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch12.
Full textConference papers on the topic "Cybersecurity risk management"
Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display, 1–10. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Full textMann, Zoltán Ádám. "Urgency in Cybersecurity Risk Management: Toward a Solid Theory." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 651–64. IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00051.
Full textEltaeib, Tarik, Shakour Abuzneid, and Khaled Elleithy. "Proposed Framework for a Comprehensive Cybersecurity Risk Management Strategy." In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1–6. IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10808119.
Full textFarouk, Suleiman, Chandrashekhar Uppin, and Gilbert George. "Enhancing Cybersecurity in Nigeria: A Proposed Risk Management Framework for Universities." In 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG), 1–8. IEEE, 2024. http://dx.doi.org/10.1109/seb4sdg60871.2024.10629748.
Full textTsai, Joseph, and Marc Dupuis. "Identification and Operationalization of Key Risks and Mitigations for the Cybersecurity Risk Management of Home Users." In 2024 Cyber Awareness and Research Symposium (CARS), 1–9. IEEE, 2024. https://doi.org/10.1109/cars61786.2024.10778868.
Full textSalutina, Tatyana Y., Galina P. Platunina, and Irina A. Frank. "Cybersecurity, Risk Management and Monitoring of Digital and Infocommunication Development of the Company." In 2024 International Conference on Engineering Management of Communication and Technology (EMCTECH), 1–5. IEEE, 2024. http://dx.doi.org/10.1109/emctech63049.2024.10741653.
Full textCurran, Barry, and James Egan. "A Method of Assessing Data Quality in Publicly Available Cybersecurity Data Sources for Use in Medical Device Cybersecurity Risk Management." In 2023 Cyber Research Conference - Ireland (Cyber-RCI), 1–9. IEEE, 2023. http://dx.doi.org/10.1109/cyber-rci59474.2023.10671424.
Full textSheh, R., K. Geappen, and D. Harriss. "AUTONOMOUS CYBERSECURITY AND AI RISK MANAGEMENT FOR UNCREWED SYSTEMS: CHALLENGES AND OPPORTUNITIES USING THE NIST FRAMEWORKS." In XPONENTIAL 2024, 46–67. Arlington, Virginia, USA: Association for Unmanned Vehicle Systems International, 2024. http://dx.doi.org/10.52202/075106-0003.
Full textKatsumata, Peter, Judy Hemenway, and Wes Gavins. "Cybersecurity risk management." In MILCOM 2010 - 2010 IEEE Military Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/milcom.2010.5680181.
Full textOhrimenco, Serghei, and Valeriu Cernei. "Cybersecurity risk." In Economic Security in the Context of Systemic Transformations, 3rd Edition. Academy of Economic Studies of Moldova, 2024. http://dx.doi.org/10.53486/escst2023.17.
Full textReports on the topic "Cybersecurity risk management"
Quinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.ir.8286b.
Full textMcWhite, Rebecca. NIST Cybersecurity Supply Chain Risk Management:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1326.ipd.
Full textQuinn, Stephen, Nahla Ivy, Matthew Barrett, Larry Feldman, Greg Witte, and R. K. Gardner. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, November 2021. http://dx.doi.org/10.6028/nist.ir.8286a.
Full textStine, Kevin, Stephen Quinn, Greg Witte, and R. K. Gardner. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, October 2020. http://dx.doi.org/10.6028/nist.ir.8286.
Full textBarker, William C., Karen Scarfone, William Fisher, and Murugiah Souppaya. Cybersecurity Framework Profile for Ransomware Risk Management. National Institute of Standards and Technology, September 2021. http://dx.doi.org/10.6028/nist.ir.8374-draft.
Full textQuinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. National Institute of Standards and Technology, January 2022. http://dx.doi.org/10.6028/nist.ir.8286c-draft.
Full textQuinn, Stephen. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286c.
Full textQuinn, Stephen. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8286c-upd1.
Full textStine, Kevin, Stephen Quinn, Nahla Ivy, Larry Feldman, Greg Witte, and R. K. Gardner. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM). National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8286a-draft2.
Full textBoyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.
Full text