This article presents the results of one empirical study that evaluated the validation of the CyberSecurity Audit Model (CSAM) for the second time in a different Canadian higher education institution. CSAM is utilized for conducting cybersecurity audits in medium or large organizations or a Nation State to evaluate and measure cybersecurity assurance, maturity, and cyber readiness. The authors review best practices and methodologies of global leaders in the cybersecurity assurance and audit arena, that puts in evidence the lack of universal guidelines to conduct extensive cybersecurity audits and the detection of existing weaknesses in general programs to deliver cybersecurity awareness training. The architecture of CSAM is described in cen...
The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent y...
With the recent uptake of fiber connectivity, broadband and internet, access has become readily avai...
The demands for information security in higher education will continue to increase. Serious data bre...
Nowadays, private corporations and public institutions are dealing with constant and sophisticated c...
These days organizations are continually facing being targets of cyberattacks and cyberthreats; the ...
Este artículo presenta los resultados de un estudio de implementación y validación del Modelo de Aud...
Traditional cybersecurity, security or information security awareness programs have become ineffecti...
Cybersecurity is important to protect data from damage or theft. Researching cybersecurity is a vita...
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regul...
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace. It shou...
Higher education institutions (HEIs) are open in their nature, decentralized, rich in population and...
MBA, North-West University, Vanderbijlpark CampusAs is the case with many organisations worldwide, b...
Purpose: The purpose of the study is to investigate the role of information security policy complian...
Cybersecurity risk is among the top risks that every organization must consider and manage, especial...
This electronic version was submitted by the student author. The certified thesis is available in th...
The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent y...
With the recent uptake of fiber connectivity, broadband and internet, access has become readily avai...
The demands for information security in higher education will continue to increase. Serious data bre...
Nowadays, private corporations and public institutions are dealing with constant and sophisticated c...
These days organizations are continually facing being targets of cyberattacks and cyberthreats; the ...
Este artículo presenta los resultados de un estudio de implementación y validación del Modelo de Aud...
Traditional cybersecurity, security or information security awareness programs have become ineffecti...
Cybersecurity is important to protect data from damage or theft. Researching cybersecurity is a vita...
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regul...
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace. It shou...
Higher education institutions (HEIs) are open in their nature, decentralized, rich in population and...
MBA, North-West University, Vanderbijlpark CampusAs is the case with many organisations worldwide, b...
Purpose: The purpose of the study is to investigate the role of information security policy complian...
Cybersecurity risk is among the top risks that every organization must consider and manage, especial...
This electronic version was submitted by the student author. The certified thesis is available in th...
The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent y...
With the recent uptake of fiber connectivity, broadband and internet, access has become readily avai...
The demands for information security in higher education will continue to increase. Serious data bre...