Supply chain cyberattacks are on the rise as attackers increasingly exploit the intricate network of supplier connections between companies. Critical infrastructures too have been successfully targeted using this strategy, whichcalls for cybersecurity risk assessment strategies to be revised to stress the focuson threats originating from suppliers. This work proposes a novel supply chaincybersecurity risk assessment tailored for companies with limited cybersecurityexpertise and constrained resources to execute risk assessment. Through a set of simple questions, this methodology first captures the perceived likelihood and impact of vulnerabilities and threats that derive from suppliers and target specific organisational assets, and then gene...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: The...
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: Th...
Supply chain cyberattacks are on the rise as attackers increasingly exploit the intricate network of...
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where p...
This paper aims to examine the current status and future direction of cybersecurity processes in sup...
Cyber supply chain (CSC) provide an organization with the ability to align its business processes, i...
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet...
This paper provides the first large-scale data-driven analysis to evaluate the predictive power of d...
The same Information and Communication Technologies (ICT) that have contributed tremendously to the ...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Modern port infrastructures have become highly dependent on the operation of complex, dynamic ICT-ba...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
Supply chains are increasingly targeted by threat actors. Using a recent taxonomy, we contrast the d...
Cybersecurity threats have been on the rise lately, along with the digital revolution. In the indust...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: The...
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: Th...
Supply chain cyberattacks are on the rise as attackers increasingly exploit the intricate network of...
Maritime information infrastructures have developed to highly interrelated cyber ecosystems, where p...
This paper aims to examine the current status and future direction of cybersecurity processes in sup...
Cyber supply chain (CSC) provide an organization with the ability to align its business processes, i...
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet...
This paper provides the first large-scale data-driven analysis to evaluate the predictive power of d...
The same Information and Communication Technologies (ICT) that have contributed tremendously to the ...
Purpose The purpose of this paper is to explore how companies approach the management of cyber and i...
Modern port infrastructures have become highly dependent on the operation of complex, dynamic ICT-ba...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
Supply chains are increasingly targeted by threat actors. Using a recent taxonomy, we contrast the d...
Cybersecurity threats have been on the rise lately, along with the digital revolution. In the indust...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: The...
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: Th...