“This journal provides valuable peer-reviewed practical business Ideas for industry leaders and academics,”
Volume 3 (2019-20)
Each volume of Cyber Security: A Peer-Reviewed Journal consists of four 100-page issues in print and online. The articles published in Volume 3 are listed below.
Volume 3 Number 4
-
Editorial
Simon Beckett, Publisher -
Moving target defence: Economics and asymmetry
Don Maclean, Chief Cybersecurity Technologist, DLT – A Tech Data Company -
1-10-60: Measuring the speed of incident response
Ronald Pool, Cyber Security Specialist, CrowdStrike -
What lawyers mean by ‘reasonable’ cyber security controls
Chris Cronin, Partner, Halock Security Labs -
The three P’s of third-party risk
Mark Sangster, Vice President and Industry Security Strategist, eSentire -
Cyber incident response approach framework for local government
Mark Brett, Researcher, Cyber Unit, London Metropolitan University, Joshua Wood, Researcher and Jamie Parker, Researcher, Wrexham Glyndwr University -
Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape
Gabrielle Hempel, Senior Security Analyst, Accenture, Diane Brady Janosek, Commandant and Training Director, National Security Agency and Donna Brady Raziano, Chief Medical Officer, Mercy LIFE -
The role of information about an opponent’s actions and intrusion detection alerts on cyber decisions in cyber security games
Palvi Aggarwal, Post-doctoral Fellow, Carnegie Mellon University and Varun Dutt, Assistant Professor, Indian Institute of Technology Mandi
Volume 3 Number 3
-
Editorial
Simon Beckett, Publisher -
Security and privacy risks in the blockchain ecosystem
Ivana Bartoletti, Head of Privacy and Data Protection, Samuel Plantié, Principal Data Protection Consultant and Arun Sambodaran, Gemserv -
IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure
Pamela K. Isom, Deputy Chief Information Officer, United States Department of Energy -
The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies
Ken Ducatel, Director IT Security, Thomas Michlmayr, Head of Unit – Digital Workplace Engineering, Philippe Merle, Deputy Head of Unit – Cloud and Service Management Capabilities, Dalibor Baskovc, Cloud Security Program coordinator, DG DIGIT, European Commission, and François Mestre, Head of Unit Information and Communication Technologies, European Centre for Disease Prevention and Control -
ADDRR: A counter kill chain cyber security model
Alex Henneberg, Digital consultant -
Zero trust in an all too trusting world
Gerald Caron, Director of Enterprise Network Management, Bureau of Information Resource Management, US Department of State -
Security monitoring strategies for your OT infrastructure
Mohammad Jbair, Senior OT Security Consultant, Airbus CyberSecurity -
Evaluating cyber risk reporting in US financial reports
Ron Fisher, Director of the Infrastructure Assurance and Analysis Division, Idaho National Laboratory, Justin Wood, Assistant Professor of Accounting at the College of Business, Idaho State University, Celia Porod, Critical Infrastructure Analysis Strategic Planner, Idaho National Laboratory, and Lydia Greco, Graduate Student, Idaho State University
Volume 3 Number 2
-
Editorial
Simon Beckett, Publisher -
Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks
Moh Cissé, CEO, M6C StrategIT -
Digital twins, the industrial Internet of Things and cyber security threats in connected industry
Mark Hearn, Director of IoT Security and Business Development, Irdeto -
A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology
Rupert Lee-Browne, Chairman, Caxton -
Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone
F. Paul Greene, Partner and the Privacy & Data Security practice group leader, Harter Secrest & Emery -
Healthcare cyber security and HIPAA assurance with business associates
Janice Ahlstrom, Director, Christopher Tait, Principal and Kenneth Zoline, Senior Manager, Baker Tilly -
Preventing cybercrime: A framework for understanding the role of human vulnerabilities
Christopher S. Kayser, Cybercrime Analytics Inc., Mary Ellen Mastrorilli, Associate Professor and Robert Cadigan, Associate Professor Emeritus, Boston University -
The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany
Jochen Werne, Authorised Officer, Bankhaus August Lenz
Volume 3 Number 1
-
Editorial
Simon Beckett, Publisher -
Impersonation fraud scenarios: How to protect, detect and respond
Mario Bruno, Lead Investigator, Citigroup -
Doing risk management correctly
Randall Frietzsche, Enterprise CISO, Denver Health -
Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners
Philip D. Schall, Associate Professor of Information Systems, Liberty University and Oludotun Oni, Professor of Information Systems and Security, University of the Cumberlands -
Surviving ransom driven DDoS extortion campaigns
Sean Newman, Senior Director of Product Management, Corero Network Security -
Resilience to combined attacks
David Winks, AcquSight -
A data privacy approach for cyber-physical systems
Jan Weldert, Cyber Security and Data Privacy Expert, Jana Karina von Wedel, Deputy Head of Cyber Security and Data Privacy and Christian Beul, INVENSITY -
Cyber security and human resource development implications for the enterprise
Andrew R. Gillam, Indiana State University