Nowadays, cyber threats are considered among the most dangerous risks by top management of enterprises. One way to deal with these risks is to insure them, but cyber insurance is still quite expensive. The insurance fee can be reduced if organisations improve their cyber security protection, i.e., reducing the insured risk. In other words, organisations need an investment strategy to decide the optimal amount of investments into cyber insurance and self-protection. In this work, we propose an approach to help a risk-averse organisation to distribute its cyber security investments in a cost-efficient way. What makes our approach unique is that next to defining the amount of investments in cyber insurance and self-protection, our proposal als...
2014-11-06In recent years, security researchers have well established the fact that technical securi...
Several research works have proposed economic and financial models to determine the optimal amount o...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
Losses due to cyber security incidents could be very significant for organisations. This fact forces...
Fast-growing numbers of technologies and devices make cyber security landscape more complicated and ...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
Investments in security and cyber-insurance are two cyber-risk management strategies that can be emp...
Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security ...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
© 2017 IEEE. This paper introduces a cyber insurance policy management for the mobile networks in wh...
The rapid development of Web technologies has driven a broad implementation of network-based applica...
Abstract. Insurance is based on the diversifiability of individual risks: if an insurance provider m...
In the last few years, rising sophistication and impact of cyberattacks has led companies to reasses...
2014-11-06In recent years, security researchers have well established the fact that technical securi...
Several research works have proposed economic and financial models to determine the optimal amount o...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
Losses due to cyber security incidents could be very significant for organisations. This fact forces...
Fast-growing numbers of technologies and devices make cyber security landscape more complicated and ...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
Investments in security and cyber-insurance are two cyber-risk management strategies that can be emp...
Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security ...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
© 2017 IEEE. This paper introduces a cyber insurance policy management for the mobile networks in wh...
The rapid development of Web technologies has driven a broad implementation of network-based applica...
Abstract. Insurance is based on the diversifiability of individual risks: if an insurance provider m...
In the last few years, rising sophistication and impact of cyberattacks has led companies to reasses...
2014-11-06In recent years, security researchers have well established the fact that technical securi...
Several research works have proposed economic and financial models to determine the optimal amount o...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...