TY - RPRT KW - cybersecurity controls KW - cybersecurity program KW - in-depth protection KW - managing cybersecurity incidents KW - threats KW - Vulnerabilities AU - Venelin Georgiev AB -

Information technologies have irreversibly entered the daily lives of consumers personally and professionally. This technology influx can be accepted as long as security is maintained at a sufficiently high level. The fulfillment of this condition is reflected in the attitude of organizations and users to the security of information systems, networks, applications and information. There are two possible options for ensuring cybersecurity in the organization: ad-hoc approach and systematic approach. This report expounds on the benefits of using a systematic approach in dealing with cybersecurity challenges based on the development, adoption, implementation and updating a dedicated organizational cybersecurity program.

BT - IT4Sec Reports DO - https://doi.org/10.11610/it4sec.0139 LA - eng M1 - 139 N2 -

Information technologies have irreversibly entered the daily lives of consumers personally and professionally. This technology influx can be accepted as long as security is maintained at a sufficiently high level. The fulfillment of this condition is reflected in the attitude of organizations and users to the security of information systems, networks, applications and information. There are two possible options for ensuring cybersecurity in the organization: ad-hoc approach and systematic approach. This report expounds on the benefits of using a systematic approach in dealing with cybersecurity challenges based on the development, adoption, implementation and updating a dedicated organizational cybersecurity program.

PY - 2021 T2 - IT4Sec Reports TI - An Organizational Cybersecurity Program ER -