Cyber Security Management: Creating Governance, Risk, and Compliance Framework

Ashish Batra*
Periodicity:April - June'2020
DOI : https://doi.org/10.26634/jse.14.4.17403

Abstract

It is important to view cyber security management from an integrated context that identifies how deliberated organizational strategies can be used to reinforce it in affiliated engagements. This study offers an insight as to how a highlyspecialized field can benefit both the specialized cybersecurity practitioners as well as the base level benefactors of cybersecurity. Ideally, cybersecurity management is integrated into the basic policies, systems, and procedures set up by an establishment with the desire to protect itself from cyberattacks. However, these interactions can be advanced into other aspects of organizational management and vice-versa. Consequently, this study uses a conceptual review of Governance, Risk and Compliance (GRC) frameworks and how they can make cyber-security system in an establishment efficient. The conceptual reviews consider the specific business continuity management planning framework that are built on a multi-cultural communication and management model, different pliability management models, as well as communication risk model systems, all designed to counter cyberattacks. The results of the study realize that cybersecurity management is a holistic process that cannot be demystified by a particular cyber-attack reaction but a conglomeration of efforts and ideas resulting from several cyber-attack reactions. Collective efforts can be built and reinforced through perpetual-oriented decisions/considerations of governance, risk and compliance frameworks.

Keywords

Cyber Security, Compliance, Framework, Governance, Risk.

How to Cite this Article?

Batra, A. (2020). Cyber Security Management: Creating Governance, Risk, and Compliance Framework. i-manager's Journal on Software Engineering, 14(4), 27-33. https://doi.org/10.26634/jse.14.4.17403

References

[1]. BWise. (n.d.). NIST cyber security framework. BWise. https://www.bwise.com/solutions/frameworks/nist-frame work
[2]. Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet governance and cyber security. Global Commission on Internet Governance, 6, 1-8.
[3]. Dar, W. M. (2016). Cyber security challenges on academic institutions and need for security framework towards institutional sustainability growth and development. i-manager's Journal on Information Technology, 5(1), 1-6. https://doi.org/10.26634/jit.5.1.4795
[4]. Limba, T., Pleta, T, Agafonov, K., & Damkus. M. (2017, August 30). Cyber security management model for critical infrastructure. Entrepreneurship and Sustainability Issues Journal, 4(4), 559-573.
[5]. McCarthy, N. (2018). The average cost of a data breach is highest in the U.S. The Forbes. https://www.forbes. com/sites/niallmccarthy/2018/07/13/the-average-cost-ofa- data-breach-is-highest-in-the-u-s-infographic/?sh=342 46eb62f37
[6]. Pardini, D, J., Heinisch, M, A, C., & Parreiras. F. S. (2016, December 17). Cyber security governance and management for smart grids in Brazilian energy utilities. JISTEM-Journal of Information Systems and Technology Management, 14(3), 385-400.
[7]. Pham, C. M. (2019). Building a maturity framework for big data cybersecurity analytics. IGI Global Journal, 3, 164- 183.
[8]. Salimath, M. S., & Philip, J. (2020, February 25). Cyber management and value creation: An organisational learning-based approach. Knowledge Management Research & Practice, 18(4), 474-487. https://doi.org/10.10 80/14778238.2020.1730719.
[9]. South, M. (2018, December 3). Scaling a governance, risk, and compliance program for the cloud, emerging technologies, and innovation. Amazon Web Services. https://aws.amazon.com/blogs/security/scaling-a-govern ance-risk-and-compliance-program-for-the-cloud/
[10]. Trim, P., & Yang-Im. L. (2016). Cyber security management: A governance, risk and compliance framework. Abingdon, UK: Routledge.
[11]. Von Solms, R., & Von Solms, B, S. (2006). Information security governance: A model based on the direct– control cycle. Computers & Security, 25(6), 408-412.
[12]. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, L., Cetin., F, Basim, H. N. (2020, February 14). Cyber security awareness, knowledge and behaviour: A comparative study. Journal of Computer Information Systems, 1-16. https://doi.org/10.1080/08874417.2020.1712269
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.