Previous research have found that organisations lack structured approaches for learning from incidents, which results in organisations missing out on opportunities to improve their security posture. In this thesis, qualitative interviews with industry experts are used in combination with a case study to explore how organisations could leverage intrusions to improve their security posture. Findings from the interviews indicate that there is a lack of structured methods for organisations to learn from intrusions integrating double-loop learning, proactive discovery and information sharing. There are, nonetheless, models that structure either organisational learning or intelligence-driven active defence. One consequence is that high-value inte...
While the need for empirical investigations of cybersecurity analysts' collaborative work practices ...
Information Security is an important aspect of decision making in organisations today. Organisations...
Information security is tasked with protecting the confidentiality, integrity, and availability of a...
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors...
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
Recent attacks and threat reports indicate that industrial control organizations are attractive targ...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
Effective response to information security incidents is a critical function of modern organisations....
Intrusion detection systems (IDSs) have become a vital part of operational computer security. They a...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Security incidents detected by information technology-dependent organisations are escalating in both...
Intrusion detection systems (IDSs) have become a vital part of operational computer security. They a...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent entities such ...
While the need for empirical investigations of cybersecurity analysts' collaborative work practices ...
Information Security is an important aspect of decision making in organisations today. Organisations...
Information security is tasked with protecting the confidentiality, integrity, and availability of a...
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors...
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
Recent attacks and threat reports indicate that industrial control organizations are attractive targ...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
Effective response to information security incidents is a critical function of modern organisations....
Intrusion detection systems (IDSs) have become a vital part of operational computer security. They a...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Security incidents detected by information technology-dependent organisations are escalating in both...
Intrusion detection systems (IDSs) have become a vital part of operational computer security. They a...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent entities such ...
While the need for empirical investigations of cybersecurity analysts' collaborative work practices ...
Information Security is an important aspect of decision making in organisations today. Organisations...
Information security is tasked with protecting the confidentiality, integrity, and availability of a...