The information security management is a widely discussed topic in recent years, due to the increasing number of attacks and the growth of the damage they can cause to the daily life of a society. In this context, new emerging paradigms, such as IoT, the CPS and Critical Infrastructure, converge towards common technologies, resulting in a dangerous interconnection and interdependence of worlds formerly separated, or even isolated. For this purpose, numerous cybersecurity frameworks have been defined, identifying organizational methodologies, mainly process-oriented, for managing a security infrastructure. This article is rather oriented to define a framework with a special attention to the management of the IT incidents, describing some min...
The rise of cyber attacks occurring in Indonesia could potentially cause incidents in institutions/c...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to large, h...
The information security management is a widely discussed topic in recent years, due to the increasi...
Today's Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming i...
This paper aims to enhance the security and resilience of Critical Information Infrastructures (CIIs...
Organizations are increasingly digitizing their business models to complement or even replace physic...
This research project presents the decision-support framework on organizational disclosure of cyber ...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
Over the last decade, we have seen a shift in the focus of cyber attacks, moving from traditional IT...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
Cybersecurity event management is critical to the successful accomplishment of an organization’s mis...
During the past decade there has been a steady increase in cyber attacks targeting Critical National...
Information Security is an important aspect of decision making in organisations today. Organisations...
Organizations today face a significant challenge in protecting their valuable IT assets. Cyber crimi...
The rise of cyber attacks occurring in Indonesia could potentially cause incidents in institutions/c...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to large, h...
The information security management is a widely discussed topic in recent years, due to the increasi...
Today's Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming i...
This paper aims to enhance the security and resilience of Critical Information Infrastructures (CIIs...
Organizations are increasingly digitizing their business models to complement or even replace physic...
This research project presents the decision-support framework on organizational disclosure of cyber ...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
Over the last decade, we have seen a shift in the focus of cyber attacks, moving from traditional IT...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to se-rious operation...
Cybersecurity event management is critical to the successful accomplishment of an organization’s mis...
During the past decade there has been a steady increase in cyber attacks targeting Critical National...
Information Security is an important aspect of decision making in organisations today. Organisations...
Organizations today face a significant challenge in protecting their valuable IT assets. Cyber crimi...
The rise of cyber attacks occurring in Indonesia could potentially cause incidents in institutions/c...
Organizations become more dependent on IT (Information Technology) for managing critical business pr...
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to large, h...