Identifying high-leverage intervention points to increase cyber resiliency—the ability to provide and maintain acceptable service levels in the face of challenges— requires identifying, integrating, and framing a diverse set of strategies that cut across boundaries of governments, corporation, non-profits, and individuals. Drawing on a preliminary framework developed by Jonathan Zittrain, we identify several sources of corporate interventions and suggest possible trajectories for intervention effectiveness over time by utilizing simulation modeling. The overall goal of this research is to develop innovative management and operational approaches using experts, emerging data sets, policy analysis, and relevant theory, along with simulation-mo...
Even with substantial investment in cyber defense resources, the risk of harm from cyber attacks can...
Combining business continuity management (BCM) and systematic cyber threat intelligence (CTI) can im...
Although considerable effort is made to secure organisational infrastructures and to protect organiz...
Recent developments within the financial services sector have demonstrated that as the diffusion of ...
Due to the hazardous current cyber environment, cyber resilience is more necessary than ever. Compa...
Given the difficulty of fully securing complex cyber systems, there is growing interest in making cy...
There is a growing number of calls to increase systems’ resilience to cyber threats, however there ...
The management of cyber issues has become essential for business success, since the activities of or...
Computational models of cognitive processes may be employed in cyber-security tools, experiments, an...
The hyper-connected environment of today has resulted in a substantial boost in productivity, effici...
International audienceWith the current high risks of cyber incidents either caused by malicious cybe...
In this research, we developed a novel approach to enable a dynamic cyber risk management strategy a...
The protection of sensitive data and technologies is critical in preserving United States (U.S.) nat...
The world has experienced and witnessed many disasters both natural and man-made in history. Such ty...
Cyber resilience has emerged as a new discipline to help organisations deal with cyber problems that...
Even with substantial investment in cyber defense resources, the risk of harm from cyber attacks can...
Combining business continuity management (BCM) and systematic cyber threat intelligence (CTI) can im...
Although considerable effort is made to secure organisational infrastructures and to protect organiz...
Recent developments within the financial services sector have demonstrated that as the diffusion of ...
Due to the hazardous current cyber environment, cyber resilience is more necessary than ever. Compa...
Given the difficulty of fully securing complex cyber systems, there is growing interest in making cy...
There is a growing number of calls to increase systems’ resilience to cyber threats, however there ...
The management of cyber issues has become essential for business success, since the activities of or...
Computational models of cognitive processes may be employed in cyber-security tools, experiments, an...
The hyper-connected environment of today has resulted in a substantial boost in productivity, effici...
International audienceWith the current high risks of cyber incidents either caused by malicious cybe...
In this research, we developed a novel approach to enable a dynamic cyber risk management strategy a...
The protection of sensitive data and technologies is critical in preserving United States (U.S.) nat...
The world has experienced and witnessed many disasters both natural and man-made in history. Such ty...
Cyber resilience has emerged as a new discipline to help organisations deal with cyber problems that...
Even with substantial investment in cyber defense resources, the risk of harm from cyber attacks can...
Combining business continuity management (BCM) and systematic cyber threat intelligence (CTI) can im...
Although considerable effort is made to secure organisational infrastructures and to protect organiz...