Cyber Security: A Peer-Reviewed Journal
Cyber Security is the major peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It showcases the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors.
Each quarterly 100-page issue analyses significant current and emerging cyber security threats and the latest strategies, techniques and technologies available to detect, manage and react to them, helping to uncover potential weaknesses in your current systems which could be open to attack. Its detailed articles and case studies – all of which are peer-reviewed by an Editorial Board of leading cyber security experts – provide in-depth, actionable advice and ‘lessons learned’ from fellow professionals, showing how cyber security programmes have been specified, designed, implemented, tested and updated in their organisations, as well as how data breaches and exercises have been managed in practice.
Cyber Security does not publish advertorial or advertising but rather in-depth articles on key topics including:
- Cyber security risk assessments, platforms and frameworks
- Building cyber response programmes
- Protective measures
- Threat surface analysis and detection
- Incident response and mitigation
- Training ‘red’ teams
- Crisis and reputation management
- Recovering from a data breach
- Employee and customer awareness, education and training
- Workforce analysis and programmes
- Reporting to senior executives and getting sufficient funding
- Scenario planning, penetration testing and cyber security exercises
- Reducing insurance premiums
- Cyber security in the supply chain
- Insider threats
- Cloud security risk
- Cyber warfare, cyber terrorism and state-sponsored attacks
- Safe disposal of sensitive data
- Cyber security investigations and digital/analogue forensics
- Hackers’ techniques and motivations
- Security architectures and network assurance
- Internet fraud techniques
- Encryption, cryptology and data protection
- User behaviour analytics
Essential reading for CISOs, CTOs, CIOs and Departmental Heads, Managing Directors, SVPs, EVPs, VPs, AVPs, Directors and Senior Managers of:
- Cyber security
- Information security
- Cyber resilience and recovery
- Security
- Cyber crime
- Business continuity
- Risk management and audit
- Network security
- Disaster recovery
- IT; as well as
- CEOs and other C-Suite executives
- Service providers and consultants
- Law enforcement
- Academics and educators
Join the conversation at: