How integration of cyber security management and incident response enables organizational learning

被引:75
作者
Ahmad, Atif [1 ]
Desouza, Kevin C. [2 ]
Maynard, Sean B. [1 ]
Naseer, Humza [1 ]
Baskerville, Richard L. [3 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Parkville, Vic 3010, Australia
[2] Queensland Univ Technol, Sch Management, QUT Business Sch, Brisbane, Qld, Australia
[3] Georgia State Univ, Robinson Coll Business, Atlanta, GA 30303 USA
基金
澳大利亚研究理事会;
关键词
INFORMATION-SYSTEMS; FRAMEWORK; PERSPECTIVE; TEAMS; RISK;
D O I
10.1002/asi.24311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors. When threats materialize, the consequences can be significant. Most large organizations invest in a dedicated information security management (ISM) function to ensure that digital assets are protected. The ISM function conducts risk assessments, develops strategy, provides policies and training to define roles and guide behavior, and implements technological controls such as firewalls, antivirus, and encryption to restrict unauthorized access. Despite these protective measures, incidents (security breaches) will occur. Alongside the security management function, many organizations also retain an incident response (IR) function to mitigate damage from an attack and promptly restore digital services. However, few organizations integrate and learn from experiences of these functions in an optimal manner that enables them to not only respond to security incidents, but also proactively maneuver the threat environment. In this article we draw on organizational learning theory to develop a conceptual framework that explains how the ISM and IR functions can be better integrated. The strong integration of ISM and IR functions, in turn, creates learning opportunities that lead to organizational security benefits including: increased awareness of security risks, compilation of threat intelligence, removal of flaws in security defenses, evaluation of security defensive logic, and enhanced security response.
引用
收藏
页码:939 / 953
页数:15
相关论文
共 60 条
[1]   A survey of information security incident handling in the cloud [J].
Ab Rahman, Nurul Hidayah ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 49 :45-69
[2]   Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack [J].
Ahmad, Atif ;
Webb, Jeb ;
Desouza, Kevin C. ;
Boorman, James .
COMPUTERS & SECURITY, 2019, 86 :402-418
[3]   A case analysis of information systems and security incident responses [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Shanks, Graeme .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2015, 35 (06) :717-723
[4]   Information security strategies: towards an organizational multi-strategy perspective [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Park, Sangseo .
JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) :357-370
[5]   Incident response teams - Challenges in supporting the organisational security function [J].
Ahmad, Atif ;
Hadgkiss, Justin ;
Ruighaver, A. B. .
COMPUTERS & SECURITY, 2012, 31 (05) :643-652
[6]  
Alshaikh M., 2014, P 25 AUSTR C INF SYS
[7]  
[Anonymous], 2018, Report on US Navy contractor data breach incident
[8]  
[Anonymous], 2010, J INFORM SYSTEM SECU
[9]  
[Anonymous], 2012, NIST SPECIAL PUBLICA
[10]  
[Anonymous], 1995, The Knowledge Creating