2016
DOI: 10.1016/j.bushor.2016.07.004
|View full text |Cite
|
Sign up to set email alerts
|

The emerging role of the CISO

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(23 citation statements)
references
References 0 publications
1
22
0
Order By: Relevance
“…This method was trialled on data arising from my doctoral research into the purpose of cyber-security functions within commercial businesses. The management of risk is fundamental to businesses and cyber-security risk, in particular, has become a board-level concern in recent years (Hooper and McKissack, 2016), even being considered existential by many businesses (Bevan et al, 2018). Cyber-security incidents affecting businesses achieve significant coverage in mass media, for example, Voreacos et al (2019), Kuchler (2017) and Thomas (2016) and as well as managing threats to their own operations, businesses are also seen as performing a role in securing nations from cyber-security threats (UK Government, 2016: 34).…”
Section: Background To My Researchmentioning
confidence: 99%
“…This method was trialled on data arising from my doctoral research into the purpose of cyber-security functions within commercial businesses. The management of risk is fundamental to businesses and cyber-security risk, in particular, has become a board-level concern in recent years (Hooper and McKissack, 2016), even being considered existential by many businesses (Bevan et al, 2018). Cyber-security incidents affecting businesses achieve significant coverage in mass media, for example, Voreacos et al (2019), Kuchler (2017) and Thomas (2016) and as well as managing threats to their own operations, businesses are also seen as performing a role in securing nations from cyber-security threats (UK Government, 2016: 34).…”
Section: Background To My Researchmentioning
confidence: 99%
“…Wieringa distinguished many methods for examining numerous types of problems, e.g. design problems and knowledge problems [34]. In this Zero Trust project we used Hevner's work as a frame of reference for the entire DSR project and potential later validation by practitioners and we use Wieringa's approach to address the challenges and technical requirements we encounter during the current and future journey of portal development (Figure 4).…”
Section: What Is Zero Trust?mentioning
confidence: 99%
“…Monitoring such residual cyber risk often falls to the Chief Information Security Officer (CISO). However, the actual ownership of cyber risk within an organization is generally uncleareven if the organization has a CISO or Chief Information Officer (CIO) who is supposed to manage information security (14). Because cyber risk is a key part of an organization's overall business risk, all departments of an organization have a vested interest in how the organization manages residual cyber risk.…”
Section: Monitor and Manage Residual Riskmentioning
confidence: 99%