@inproceedings{792d77bef53246d5ae78829b74c54a3d,
title = "Cybersecurity Governance: How can we measure it?",
abstract = "Any Corporate Governance aspect involves numerous steps when it comes to determining how efficient and effective an organization's governance implementations are. Cybersecurity Governance is not much different in this regard. As Cybersecurity Governance is a relatively new and very important concept, the idea of assessing the efficacy of Cybersecurity and Cybersecurity Governance implementation is still highly debated and researched. In this article, we discuss adaptations to a Cybersecurity Governance Maturity Model and we will also discuss a second and important aspect related to the Cybersecurity Governance Maturity assessment; reporting. We will discuss how the maturity model can be used to create descriptive and understandable reports for the various roles within the Board of Directors and Executive Management.",
keywords = "Cyber Security, Cyber Security Governance, Cyber Security Maturity Model, ISO/IEC 27032:2012, Information Security, Information Security Governance, Information Technology, Maturity Model, Reporting Tool",
author = "{De Bruin}, Rossouw and {Von Solms}, {S. H.}",
note = "Publisher Copyright: {\textcopyright} 2016 IIMC.; 2016 IST-Africa Conference, IST-Africa 2016 ; Conference date: 11-05-2016 Through 13-05-2016",
year = "2016",
month = aug,
day = "2",
doi = "10.1109/ISTAFRICA.2016.7530578",
language = "English",
series = "2016 IST-Africa Conference, IST-Africa 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2016 IST-Africa Conference, IST-Africa 2016",
address = "United States",
}