Cybersecurity Management: Developing Robust Strategies for Protecting Corporate Information Systems

Authors

  • Manika Kaushik Santa Ana Unified School District, Orange County, California, United States

DOI:

https://doi.org/10.55938/ijgasr.v3i2.75

Keywords:

Cybersecurity, Federated Learning, Contextual Security, Collaborative Security, Tamper resistant Data, Agile Security, Proactive Threat Detection, Regulatory Compliance, Human-centric Security

Abstract

This growing complexity and sophistication of cyber threats call for a sea change concerning how organizations handle cybersecurity. Traditional isolated, reactive security models no longer protect against evolving digital risk. This abstract provides an innovation-oriented comprehensive methodology for completely transforming the approach of organizations to the protection of their critical information assets. At the heart of the method lies a recognition of the fact that cybersecurity is not strictly a technological challenge but has multifaceted elements that have to be aligned with the overall business objectives operational constraints, and risk tolerance of the organization. One of the crucial innovations is the integration of advanced analytics, blockchain technology, and machine learning techniques that will enable any organization to create a much more accurate and proactive perspective related to its vulnerability to cyber threats. This holistic cybersecurity methodology can transform security posture, strengthen collaborative capabilities, and build a resilient cybersecurity ecosystem through effective implementation and validation. These insights and lessons learned will, no doubt, inspire and guide other organizations toward a more robust, adaptive, and collaborative approach to cybersecurity management as the organization continues to improve and further innovate in the field of best security practices.

Downloads

Download data is not yet available.

References

Singh, N.; Krishnaswamy, V.; Zhang, J.Z. Intellectual structure of cybersecurity research in enterprise information systems. Enterp. Inf. Syst. 2022, 17, 2025545. DOI: https://doi.org/10.1080/17517575.2022.2025545

Peppard, J.; Galliers, R.D.; Thorogood, A. Information systems strategy as practice: Micro strategy and strategizing for IS. J. Strateg. Inf. Syst. 2014, 23, 1–10 DOI: https://doi.org/10.1016/j.jsis.2014.01.002

Bell, E.; Bryman, A.; Harley, B. Business Research Methods; Oxford University Press: Oxford, UK, 2018.

De-Miguel-Molina, B.; de-Miguel-Molina, M.; Albors, J. How to Undertake a Literature Review through Biblio-Metrics. An Example with Review about User Innovation. In Proceedings of the 1st International Conference on Business Management; Universitat Politècnica de València: València, Spain, June 2015. DOI: https://doi.org/10.4995/ICBM.2015.1327

Ritchie, J.; Lewis, J. Qualitative Research Practice—A Guide for Social Science Students and Researchers; Sage Publications Ltd.: Thousand Oaks, CA, USA, 2003.

Lee, N.; Lings, I. Doing Business Research: A Guide to Theory and Practice; SAGE Publications Ltd.: London, UK, 2008.

Yin, R.K. Case Study Research and Applications: Design and Methods, 6th ed.; SAGE Publications Ltd.: London, UK, 2018.

Gray, D. Doing Research in the Business World; SAGE Publications Ltd.: London, UK, 2016.

Laudon, K.C.; Laudon, J.P. Management Information Systems; Pearson Education: Upper Saddle River, NJ, USA, 2015.

Stair, R.; Reynolds, G. Principles of Information Systems; Cengage Learning: Boston, MA, USA, 2020; Available online: https://books.google.ch/books?id=m7AEEAAAQBAJ (accessed on 29 January 2024).

Wang, F.; Lv, J.; Zhao, X. How do information strategy and information technology governance influence firm performance? Front. Psychol. 2022, 13, 1023697. DOI: https://doi.org/10.3389/fpsyg.2022.1023697

Iannacone, M.; Bohn, S.; Nakamura, G.; Gerth, J.; Huffer, K.; Bridges, R.; Ferragut, E.; Goodall, J. Developing an Ontology for Cyber Security Knowledge Graphs. In ACM International Conference Proceeding Series; Association for Computing Machinery: New York, NY, USA, 2015; p. 12. DOI: https://doi.org/10.1145/2746266.2746278

Heck, H.; Kieselmann, O.; Wacker, A. Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems. In Proceedings of the IEEE 10th International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2016, Augsburg, Germany, 12–16 September 2016; pp. 140–141. DOI: https://doi.org/10.1109/SASO.2016.20

Bridges, S.M.; Keiser, K.; Sissom, N.; Graves, S.J. Cyber Security for Additive Manufacturing. In ACM International Conference Proceeding Series; Association for Computing Machinery: New York, NY, USA, 2015 DOI: https://doi.org/10.1145/2746266.2746280

Chopra, Y., Kaushik, P., Rathore, S. P. S., & Kaur, P.(2023). Uncovering Semantic Inconsistencies and Deceptive Language in False News Using Deep Learning and NLP Techniques for Effective Management. International Journal on Recent and Innovation Trends in Computing and Communication, 11(8s), 681–692. DOI: https://doi.org/10.17762/ijritcc.v11i8s.7256

Khan, Y.I.; Al-Shaer, E.; Rauf, U. Cyber resilience-by-construction: Modeling, measuring & verifying. In Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, Denver, CO, USA, 12 October 2015; pp. 9–14. DOI: https://doi.org/10.1145/2809826.2809836

Published

2024-07-02

How to Cite

Kaushik, M. (2024). Cybersecurity Management: Developing Robust Strategies for Protecting Corporate Information Systems. International Journal for Global Academic & Scientific Research, 3(2), 24–35. https://doi.org/10.55938/ijgasr.v3i2.75

Similar Articles

<< < 1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.