Over the past few years, the number of attacks against IT systems and the resulting incidents has steadily increased. To protect against these attacks, joint approaches, which include the sharing of incident information, are increasingly gaining in importance. Several incident reporting formats build the basis for information sharing. However, it is often not clear how to design the underlying processes and which formats would fit the specific use cases. To close this gap, we have introduced an incident reporting process model and the generic model UPSIDE for basic incident reporting requirements. Subsequently, we have identified state-of-the-art incident reporting formats and used the introduced models to conduct a comparative analysis of ...
Incident information sharing is being encouraged and mandated as a way of improving overall cyber in...
The number of security incidents is still increasing. The re-occurrence of past breaches shows that ...
Managing the different types and the nature of information security incidents has become a challengi...
Cyber Threat Intelligence (CTI) is threat informa- tion intended for security purposes. However, use...
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use f...
\u3cp\u3eIncident reporting is a very well-known technique in application domains such as air traffi...
Systematic collection of safety incident / accident data has been common in many industries for deca...
This paper examines the role of information security incident reporting systems in the wider context...
There are increasing obligations on companies to report cybersecurity incidents to national and int...
Companies need to control several different sectors of corporate safety and security including, for ...
The literature on incident reporting generally describes Incident Reporting Systems (IRS) as technol...
In recent years, the use of cloud computing has increased significantly. More and more organizations...
An increasing use of digital solutions suggests that organizations today are more exposed to attacks...
Incident reporting is a very well-known technique in application domains such as air traffic managem...
This report presents a prototype best practice model for performing incident management processes an...
Incident information sharing is being encouraged and mandated as a way of improving overall cyber in...
The number of security incidents is still increasing. The re-occurrence of past breaches shows that ...
Managing the different types and the nature of information security incidents has become a challengi...
Cyber Threat Intelligence (CTI) is threat informa- tion intended for security purposes. However, use...
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use f...
\u3cp\u3eIncident reporting is a very well-known technique in application domains such as air traffi...
Systematic collection of safety incident / accident data has been common in many industries for deca...
This paper examines the role of information security incident reporting systems in the wider context...
There are increasing obligations on companies to report cybersecurity incidents to national and int...
Companies need to control several different sectors of corporate safety and security including, for ...
The literature on incident reporting generally describes Incident Reporting Systems (IRS) as technol...
In recent years, the use of cloud computing has increased significantly. More and more organizations...
An increasing use of digital solutions suggests that organizations today are more exposed to attacks...
Incident reporting is a very well-known technique in application domains such as air traffic managem...
This report presents a prototype best practice model for performing incident management processes an...
Incident information sharing is being encouraged and mandated as a way of improving overall cyber in...
The number of security incidents is still increasing. The re-occurrence of past breaches shows that ...
Managing the different types and the nature of information security incidents has become a challengi...