36 résultats pour « cybersecurity »

Supply Chain Characteristics as Predictors of Cyber Risk: A Machine‑Learning Assessment

"... supply chain network features add significant detection power to predicting enterprise cyber risk, relative to merely using enterprise-only attributes. Particularly, compared to a base model that relies only on internal enterprise features... Given that each cyber data breach is a low probability high impact risk event, these improvements in the prediction power have significant value."

Cybersecurity, Cloud and Critical Infrastructure

"... there is a risk that the EU’s Network and Information Systems Directive (‘NIS Directive’) might lead to only incremental improvements in the cybersecurity of Europe’s critical infrastructure and digital services, while generating substantial compliance activity, aimed at placating regulators and reassuring the general public."

The Tensions of Cyber‑Resilience: From Sensemaking to Practice

"We apply Weick’s (1995) sensemaking framework to examine four foundational tensions of cyber-resilience: a definitional tension, an environmental tension, an internal tension, and a regulatory tension. We then document how these tensions are embedded in cyber-resilience practices at the preparatory, response and adaptive stages. We rely on qualitative data from a sample of 58 cybersecurity professionals in the financial sector..."

Auditors’ Response to Cybersecurity Risk: Human Capital Investment and Cross‑Client Influence

Date : Tags : , , , , ,
"Our evidence also implies that client firms that share the same audit office as breached firms increase their disclosure of cybersecurity risk and their demand for cybersecurity human capital. Reconciling with the Bayesian learning theory, these effects only manifest for auditors located in states that have been only sporadically exposed to data breaches."

A Mathematical Model for Risk Assessment of Social Engineering Attacks

"Social engineering is a very common type of malicious activity conducted on cyberspace that targets both individuals and companies in order to gain access to information or systems. It is part of the broader domain of cybersecurity and the first step to mitigate this type of attack is to know its attack vectors. This way, the risk of becoming a victim of this type of attack can be reduced by technical means, proper security culture and procedural solutions..."