Cybersecurity Management: Developing Robust Strategies for Protecting Corporate Information Systems
DOI:
https://doi.org/10.55938/ijgasr.v3i2.75Keywords:
Cybersecurity, Federated Learning, Contextual Security, Collaborative Security, Tamper resistant Data, Agile Security, Proactive Threat Detection, Regulatory Compliance, Human-centric SecurityAbstract
This growing complexity and sophistication of cyber threats call for a sea change concerning how organizations handle cybersecurity. Traditional isolated, reactive security models no longer protect against evolving digital risk. This abstract provides an innovation-oriented comprehensive methodology for completely transforming the approach of organizations to the protection of their critical information assets. At the heart of the method lies a recognition of the fact that cybersecurity is not strictly a technological challenge but has multifaceted elements that have to be aligned with the overall business objectives operational constraints, and risk tolerance of the organization. One of the crucial innovations is the integration of advanced analytics, blockchain technology, and machine learning techniques that will enable any organization to create a much more accurate and proactive perspective related to its vulnerability to cyber threats. This holistic cybersecurity methodology can transform security posture, strengthen collaborative capabilities, and build a resilient cybersecurity ecosystem through effective implementation and validation. These insights and lessons learned will, no doubt, inspire and guide other organizations toward a more robust, adaptive, and collaborative approach to cybersecurity management as the organization continues to improve and further innovate in the field of best security practices.
Downloads
References
Singh, N.; Krishnaswamy, V.; Zhang, J.Z. Intellectual structure of cybersecurity research in enterprise information systems. Enterp. Inf. Syst. 2022, 17, 2025545. DOI: https://doi.org/10.1080/17517575.2022.2025545
Peppard, J.; Galliers, R.D.; Thorogood, A. Information systems strategy as practice: Micro strategy and strategizing for IS. J. Strateg. Inf. Syst. 2014, 23, 1–10 DOI: https://doi.org/10.1016/j.jsis.2014.01.002
Bell, E.; Bryman, A.; Harley, B. Business Research Methods; Oxford University Press: Oxford, UK, 2018.
De-Miguel-Molina, B.; de-Miguel-Molina, M.; Albors, J. How to Undertake a Literature Review through Biblio-Metrics. An Example with Review about User Innovation. In Proceedings of the 1st International Conference on Business Management; Universitat Politècnica de València: València, Spain, June 2015. DOI: https://doi.org/10.4995/ICBM.2015.1327
Ritchie, J.; Lewis, J. Qualitative Research Practice—A Guide for Social Science Students and Researchers; Sage Publications Ltd.: Thousand Oaks, CA, USA, 2003.
Lee, N.; Lings, I. Doing Business Research: A Guide to Theory and Practice; SAGE Publications Ltd.: London, UK, 2008.
Yin, R.K. Case Study Research and Applications: Design and Methods, 6th ed.; SAGE Publications Ltd.: London, UK, 2018.
Gray, D. Doing Research in the Business World; SAGE Publications Ltd.: London, UK, 2016.
Laudon, K.C.; Laudon, J.P. Management Information Systems; Pearson Education: Upper Saddle River, NJ, USA, 2015.
Stair, R.; Reynolds, G. Principles of Information Systems; Cengage Learning: Boston, MA, USA, 2020; Available online: https://books.google.ch/books?id=m7AEEAAAQBAJ (accessed on 29 January 2024).
Wang, F.; Lv, J.; Zhao, X. How do information strategy and information technology governance influence firm performance? Front. Psychol. 2022, 13, 1023697. DOI: https://doi.org/10.3389/fpsyg.2022.1023697
Iannacone, M.; Bohn, S.; Nakamura, G.; Gerth, J.; Huffer, K.; Bridges, R.; Ferragut, E.; Goodall, J. Developing an Ontology for Cyber Security Knowledge Graphs. In ACM International Conference Proceeding Series; Association for Computing Machinery: New York, NY, USA, 2015; p. 12. DOI: https://doi.org/10.1145/2746266.2746278
Heck, H.; Kieselmann, O.; Wacker, A. Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems. In Proceedings of the IEEE 10th International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2016, Augsburg, Germany, 12–16 September 2016; pp. 140–141. DOI: https://doi.org/10.1109/SASO.2016.20
Bridges, S.M.; Keiser, K.; Sissom, N.; Graves, S.J. Cyber Security for Additive Manufacturing. In ACM International Conference Proceeding Series; Association for Computing Machinery: New York, NY, USA, 2015 DOI: https://doi.org/10.1145/2746266.2746280
Chopra, Y., Kaushik, P., Rathore, S. P. S., & Kaur, P.(2023). Uncovering Semantic Inconsistencies and Deceptive Language in False News Using Deep Learning and NLP Techniques for Effective Management. International Journal on Recent and Innovation Trends in Computing and Communication, 11(8s), 681–692. DOI: https://doi.org/10.17762/ijritcc.v11i8s.7256
Khan, Y.I.; Al-Shaer, E.; Rauf, U. Cyber resilience-by-construction: Modeling, measuring & verifying. In Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, Denver, CO, USA, 12 October 2015; pp. 9–14. DOI: https://doi.org/10.1145/2809826.2809836
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Manika Kaushik
This work is licensed under a Creative Commons Attribution 4.0 International License.