[HTML][HTML] Learning from cyber security incidents: A systematic review and future research agenda
Cyber security incidents are now prevalent in many organisations. Arguably, those who can
learn from security incidents and address the underlying causes will reduce the prevalence …
learn from security incidents and address the underlying causes will reduce the prevalence …
EARS to cyber incidents in health care
MS Jalali, B Russell, S Razak… - Journal of the American …, 2019 - academic.oup.com
Background Connected medical devices and electronic health records have added
important functionality to patient care, but have also introduced a range of cybersecurity …
important functionality to patient care, but have also introduced a range of cybersecurity …
[HTML][HTML] Stakeholder perspectives and requirements on cybersecurity in Europe
S Fischer-Hübner, C Alcaraz, A Ferreira… - Journal of information …, 2021 - Elsevier
This article presents an overview and analysis of the key cybersecurity problems, challenges
and requirements to be addressed in the future, which we derived through 63 interviews with …
and requirements to be addressed in the future, which we derived through 63 interviews with …
Developing decision support for cybersecurity threat and incident managers
R van der Kleij, JM Schraagen, B Cadet, H Young - Computers & Security, 2022 - Elsevier
Cybersecurity threat and incident managers in large organizations, especially in the
financial sector, are confronted more and more with an increase in volume and complexity of …
financial sector, are confronted more and more with an increase in volume and complexity of …
Lessons lost: Incident response in the age of cyber insurance and breach attorneys
Incident Response (IR) allows victim firms to detect, contain, and recover from security
incidents. It should also help the wider community avoid similar attacks in the future. In …
incidents. It should also help the wider community avoid similar attacks in the future. In …
Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …
A Akinsola, A Akinde - arXiv preprint arXiv:2407.13785, 2024 - arxiv.org
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …
safeguard the software supply chain against evolving threats. It aims to foster an …
[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …
highlight their inevitability and the impossibility of completely protecting the integrity of …
[HTML][HTML] Operations-informed incident response playbooks
Cyber security incident response playbooks are critical for establishing an effective incident
response capability within organizations. We identify a significant conceptual gap in the …
response capability within organizations. We identify a significant conceptual gap in the …
Values and value conflicts in the context of OSINT technologies for cybersecurity incident response: A value sensitive design perspective
The negotiation of stakeholder values as a collaborative process throughout technology
development has been studied extensively within the fields of Computer Supported …
development has been studied extensively within the fields of Computer Supported …
The impact of organizational structure and technology use on collaborative practices in computer emergency response teams: An empirical study
Besides the merits of increasing digitization and interconnectedness in private and
professional spaces, critical infrastructures and societies are more and more exposed to …
professional spaces, critical infrastructures and societies are more and more exposed to …