How integration of cyber security management and incident response enables organizational learning
Autor: | Kevin C. Desouza, Atif Ahmad, Richard L. Baskerville, Humza Naseer, Sean B. Maynard |
---|---|
Rok vydání: | 2019 |
Předmět: |
Information Systems and Management
Computer Networks and Communications business.industry media_common.quotation_subject 05 social sciences Library and Information Sciences 050905 science studies Computer security computer.software_genre Encryption Conceptual framework Information security management restrict Organizational learning Information system Security management Business 0509 other social sciences 050904 information & library sciences Function (engineering) computer Information Systems media_common |
Zdroj: | Journal of the Association for Information Science and Technology. 71:939-953 |
ISSN: | 2330-1643 2330-1635 |
DOI: | 10.1002/asi.24311 |
Popis: | Digital assets of organizations are under constant threat from a wide assortment of nefarious actors. When threats materialize, the consequences can be significant. Most large organizations invest in a dedicated information security management (ISM) function to ensure that digital assets are protected. The ISM function conducts risk assessments, develops strategy, provides policies and training to define roles and guide behavior, and implements technological controls such as firewalls, antivirus, and encryption to restrict unauthorized access. Despite these protective measures, incidents (security breaches) will occur. Alongside the security management function, many organizations also retain an incident response (IR) function to mitigate damage from an attack and promptly restore digital services. However, few organizations integrate and learn from experiences of these functions in an optimal manner that enables them to not only respond to security incidents, but also proactively maneuver the threat environment. In this article we draw on organizational learning theory to develop a conceptual framework that explains how the ISM and IR functions can be better integrated. The strong integration of ISM and IR functions, in turn, creates learning opportunities that lead to organizational security benefits including: increased awareness of security risks, compilation of threat intelligence, removal of flaws in security defenses, evaluation of security defensive logic, and enhanced security response. |
Databáze: | OpenAIRE |
Externí odkaz: |