MULTI-METHOD MODELING AND ANALYSIS OF THE CYBERSECURITY VULNERABILITY MANAGEMENT ECOSYSTEM

July 1, 2019

This paper presents modeling and analysis of two critical foundational processes of the cybersecurity vulnerability management ecosystem using a combination of system dynamics and agent-based modeling techniques. The preliminary result from this analysis is that misapplication of either of these foundational processes could contribute to the fragility and risk associated with the many national infrastructures and organizational missions that rely on the Internet.

Spotlight

BankVault

Imagine owning a business – and have to temporarily shut your business to deal with a computer virus that’s wreaked havoc on your business simply because your antivirus, firewall, and off-site data backups failed. The pain is truly excruciating. Yet it's happening to more and more businesses every day. BankVault is simple yet powerful software which protect your most valuable assets - your computer, online credentials, and ultimately the money in your bank account. It is the best way to win new business and customer confidence in this digital age. DID YOU KNOW? * 1 in 5 Australians have been victims of identity crime with online banking, online shopping, and computer hacking to blame * 65% of Australian organisations experienced cybercrime in the last 24 months * Only 42 percent of Australian organisations have a fully operational incident response plan * It takes 31 days to resolve a cybercrime... Meanwhile, thousands of dollars are lost due to loss of reputation, lack of client confi

OTHER WHITEPAPERS
news image

Harness Advanced Push-to-talk to Transform Physical Security Operations

whitePaper | December 21, 2022

Hytera’s mission is to develop the future-proof solutions with a holistic approach to your critical communications system and service needs, support public safety agencies in making the city safer, and enable security organisations to keep the enterprise more secure and ensure the safety and security of responders and staff, through driving more efficiency, effectiveness and productivity to operation and management of both daily operations and critical emergencies, while reducing the cost.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

The Ransomware Threat

whitePaper | December 22, 2022

Ransomware continues to be among the most critical risks facing organizations of all sizes. Attackers have perfected techniques and business models that will pose a challenge to even the best prepared organizations. While the encryption of a high volume of computers on a network can potentially be mitigated by adequate backups, ransomware actors have discovered new avenues of extortion, such as threatening to release data stolen prior to encryption. While ransomware attacks are time consuming to perform, ransomware actors have managed to achieve scale through the introduction of “ransomware-as-a-service” operations, renting out their tools and infrastructure to other attackers in exchange for a cut of the profits.

Read More
news image

Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable

whitePaper | November 29, 2022

In February 2022, a cyberattack on commercial satellite services in Ukraine caused electricitygenerating wind farms to shut down across Central Europe. In July 2021, supermarkets in Sweden were forced to close their doors after a cyberattack on an IT services provider based in Florida, USA.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Darktrace Cyber AI Analyst: Autonomous Investigations

whitePaper | February 9, 2023

This white paper examines the technology and design principles behind Darktrace's Cyber AI Analyst, a groundbreaking innovation that automates threat investigations at speed and scale.

Read More

Spotlight

BankVault

Imagine owning a business – and have to temporarily shut your business to deal with a computer virus that’s wreaked havoc on your business simply because your antivirus, firewall, and off-site data backups failed. The pain is truly excruciating. Yet it's happening to more and more businesses every day. BankVault is simple yet powerful software which protect your most valuable assets - your computer, online credentials, and ultimately the money in your bank account. It is the best way to win new business and customer confidence in this digital age. DID YOU KNOW? * 1 in 5 Australians have been victims of identity crime with online banking, online shopping, and computer hacking to blame * 65% of Australian organisations experienced cybercrime in the last 24 months * Only 42 percent of Australian organisations have a fully operational incident response plan * It takes 31 days to resolve a cybercrime... Meanwhile, thousands of dollars are lost due to loss of reputation, lack of client confi

Events