54 résultats
pour « cybersecurity »
The Cyber Due Diligence Object Model (CDDOM) is a structured, extensible framework designed for SMEs to manage cybersecurity due diligence in digital supply chains. Aligned with regulations like NIS2, DORA, CRA, and GDPR, CDDOM enables continuous, automated, and traceable due diligence. It integrates descriptive schemas, role-specific messaging, and decision support to facilitate supplier onboarding, risk reassessment, and regulatory compliance. Validated in real-world scenarios, CDDOM supports automation, transparency, and interoperability, translating compliance and trust signals into machine-readable formats. It fosters resilient, decision-oriented cyber governance, addressing modern cybersecurity challenges outlined in recent research.
This study extends the Gordon–Loeb model for cybersecurity investment by incorporating a Hawkes process to model temporally clustered cyberattacks, reflecting real-world attack bursts. Formulated as a stochastic optimal control problem, it maximizes net benefits through adaptive investment policies that respond to attack arrivals. Numerical results show these dynamic strategies outperform static and Poisson-based models, which overlook clustering, especially in high-risk scenarios. The framework aids risk managers in tailoring responsive cybersecurity strategies. Future work includes empirical calibration, risk-averse loss modeling, cyber-insurance integration, and multivariate Hawkes processes for diverse attack types.
The EU prioritizes cybersecurity and data protection due to rising cyber threats and digital transformation. It employs regulations like GDPR for personal data and the NIS Directive for critical infrastructure resilience. This study analyzes their impact, challenges, and interplay, also comparing them globally to assess effectiveness in safeguarding digital security and fostering trust.
Increased cyber risk drives U.S. banks to diversify information sources, especially large, nationally chartered banks. This suggests cyber threats erode data confidence, forcing banks to seek verification. Specialized institutions are more vulnerable to data integrity disruptions.
This study integrates cybersecurity risks into a neoclassical growth model, revealing that proactive investments enhance long-term stability, while industry-specific vulnerabilities (capital-intensive resilience vs. labor-intensive disruptions) and systemic risks affect macroeconomic resilience. Optimal resource allocation, adaptive risk strategies via Bayesian updating, and prioritizing cybersecurity in long-term planning balance security with growth.
This study analyzes financial risk management in digital-only banking using quantitative methods. Phishing (35%) and ransomware (20%) cause major financial losses. Basel III compliance reduces fraud risks, while AI-driven fraud monitoring has inefficiencies. Regulatory enforcement improves fraud prevention by 1.90%, highlighting the need for stronger cybersecurity and regulatory measures.
Learning from industry cybersecurity breaches boosts firm growth and performance. Firms adapt CEO pay to manage risk and invest in sales, seizing opportunities. This shows learning from rivals' misfortune is valuable, highlighting the strategic importance of competitor learning.
Despite tech advances, human errors fuel cybersecurity breaches, with 2023 data breach costs averaging $9.48 million. Ineffective education and policies fail to curb threats. This paper, citing executive interviews and research, urges balanced communication to warn users and boost their cybersecurity confidence without causing excessive fear.
The Global Cybersecurity Outlook 2025 reveals escalating cyber risks due to geopolitical tensions, technological advancements, and supply chain vulnerabilities. Over 50% of organizations cite supply chain risks as their top concern. Experts stress updating technology, redefining risk management, and fostering collaboration to address growing cybercrime, AI threats, and regulatory challenges.
In the ever changing landscape cybersecurity landscape, Jeff Crume reviews his predictions for last year and peers into his crystal ball to see what may be coming in 2025 and beyond especially when it comes to how AI will change the threat landscape to possible solutions.