41 résultats
pour « cybersecurity »
The study highlights that while modern states have developed concrete strategies to respond to potential threats, the resemblance of these strategies to one another could create unexpected challenges. The dynamic nature of the internet and the multitude of actors and sources of risk could put conventional wisdom to the test at a stage where the scope for response is limited. This highlights the need for states to continually adapt their strategies to address emerging risks and avoid relying solely on common knowledge or uniform thinking.
"After reviewing the main characteristics of cyber risk, we consider the three layers of cyber space: hardware, software and psycho-cognitive layer."
"... new risks—and the intensification of longstanding risks—are pressure-testing the agility and resilience of corporate strategies, risk management systems and practices."
"This paper explores the notion of ‘cyber risk’, asking how we might understand it through a sociotechnical lens. It pays specific attention to how we can theorise cyber risk as an assemblage of sociotechnical ‘riskscapes’, in which our understanding of risk goes beyond organisational imperatives of ‘risk management’ and into treating cyber risk as a set of productive knowledges and practices within a political economy of uncertainty."
"Using the lab, in numerical case studies, we identify two classes of measures to control systemic cyber risks: security- and topology-based interventions. We discuss the implications of our findings on selected real-world cybersecurity measures currently applied in the insurance and regulation practice or under discussion for future cyber risk control. To this end, we provide a brief overview of the current cybersecurity regulation and emphasize the role of insurance companies as private regulators."
"We believe our paper adds to the important body of cybersecurity literature that explores the roles of government and business, particularly corporate directors, in the governance of data security."
"... supply chain network features add significant detection power to predicting enterprise cyber risk, relative to merely using enterprise-only attributes. Particularly, compared to a base model that relies only on internal enterprise features... Given that each cyber data breach is a low probability high impact risk event, these improvements in the prediction power have significant value."
"Using a large sample of U.S. firms over the period 2007-2017, we find that when cybersecurity risk is higher, firms hold more cash."
"These attacks are unknown to the human eye due to malicious intent to harm any underlying infrastructure. So, to overcome the problems and make a flexible solution, we propose a framework where machine learning algorithms are applied to find relevant features from the existing dataset."
"... there is a risk that the EU’s Network and Information Systems Directive (‘NIS Directive’) might lead to only incremental improvements in the cybersecurity of Europe’s critical infrastructure and digital services, while generating substantial compliance activity, aimed at placating regulators and reassuring the general public."