The aim of this paper is to deepen the application of value at risk in the cyber domain, with particular attention to its potential role in security investment valuation. Cyber risk is a fundamental component of the overall risk faced by any organization. In order to plan the size of security investments and to estimate the consequent risk reduction, managers strongly need to quantify it. Accordingly, they can decide about the possibility of sharing residual risk with a third party, such as an insurance company. Recently, cyber risk management techniques are including some risk quantile-based measures that are widely employed in the financial domain. They refer to value at risk that, in the cyber context, takes the name of cyber value at ri...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceAs a basis for...
International Carnahan Conference on Security Technology(2017 : Madrid; Spain)IT system risk assessm...
Risk transfer plays an increasing role in information security risk management as organisations purc...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
There is no business endeavor with profit motive, yet without attendant risks. Businesses must face...
Historically, the financial benefits of cyber security investments have not been calculated with the...
Transferring security risk to a third party through cyber insurance is an unfamiliar playing field f...
Accelerated development of technologies and their more frequent application within business organiza...
The increasing value of data held in enterprises makes it an attractive target to attackers. The inc...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
The development of the entire IT sector is very dynamic and its consequences penetrate into all sphe...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
Nowadays, cyber security plays a crucial role for any organization. Na-tional and international d...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
Cyber-attacks pose a growing threat to global commerce that is increasingly reliant on digital techn...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceAs a basis for...
International Carnahan Conference on Security Technology(2017 : Madrid; Spain)IT system risk assessm...
Risk transfer plays an increasing role in information security risk management as organisations purc...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
There is no business endeavor with profit motive, yet without attendant risks. Businesses must face...
Historically, the financial benefits of cyber security investments have not been calculated with the...
Transferring security risk to a third party through cyber insurance is an unfamiliar playing field f...
Accelerated development of technologies and their more frequent application within business organiza...
The increasing value of data held in enterprises makes it an attractive target to attackers. The inc...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
The development of the entire IT sector is very dynamic and its consequences penetrate into all sphe...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
Nowadays, cyber security plays a crucial role for any organization. Na-tional and international d...
The dependence on cyberspace has considerably increased over time, as such, people look at risk asso...
Cyber-attacks pose a growing threat to global commerce that is increasingly reliant on digital techn...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceAs a basis for...
International Carnahan Conference on Security Technology(2017 : Madrid; Spain)IT system risk assessm...
Risk transfer plays an increasing role in information security risk management as organisations purc...