The ISO/IEC 27001 information security management standard: how to extract value from data in the IT sector

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2023 - mdpi.com
In order to handle their regulatory and legal responsibilities and to retain trustworthy
strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …

Developing a risk analysis strategy framework for impact assessment in information security management systems: A case study in it consulting industry

F Kitsios, E Chatzidimitriou, M Kamariotou - Sustainability, 2022 - mdpi.com
Organizations must be committed to ensuring the confidentiality, availability, and integrity of
the information in their possession to manage legal and regulatory obligations and to …

AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity

J Hochstetter-Diez, M Diéguez-Rebolledo… - Applied Sciences, 2023 - mdpi.com
In today's world, private and government organizations are legally obligated to prioritize their
information security. They need to provide proof that they are continually improving their …

MASISCo—Methodological Approach for the Selection of Information Security Controls

M Diéguez, C Cares, C Cachero, J Hochstetter - Applied Sciences, 2023 - mdpi.com
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …

[HTML][HTML] Are We Ready to Manage Digital Risks Today and Tomorrow?

R Bierens, A Shahim - Journal of Information Systems Security, 2022 - jissec.org
New digital technologies are quickly changing organizations. Many organisations begun
their digital transformation without awareness of the dynamic nature and the dependencies …

[PDF][PDF] The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability 2023, 15, 5828

F Kitsios, E Chatzidimitriou, M Kamariotou - 2023 - academia.edu
In order to handle their regulatory and legal responsibilities and to retain trustworthy
strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …

Predictors of the Ability of Cybersecurity Professionals to Implement the National Institute of Standards and Technology Risk Management Framework

BL Hale - 2024 - search.proquest.com
Every organization is vulnerable to cyber threats. Information technology and systems
permeate organizations. Across the global interconnectedness of operational technology …

Exploring the Use of Asset Metadata to Provide Prioritization Through Cybersecurity Risk Measurement

HK Dart - 2024 - search.proquest.com
This dissertation addressed the imperative need for a demonstrative method in cybersecurity
to prioritize IT assets by integrating multiple quantitative criteria. The research problem …

MASISCo—Methodological Approach for the Selection of Information Security Controls

M Diéguez Rebolledo, C Cares Gallardo, C Cachero… - 2023 - rua.ua.es
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …

[PDF][PDF] Evaluating the Impact of Metric-based Security Tools on Company Performance and Decision-making

E David - 2023 - ericlynndavid.com
This quantitative causal-comparative study examined the differences between security
metrics and decision-making in companies. The importance of cyber security, particularly at …