Cybersecurity Governance: How can we measure it?

Rossouw De Bruin, S. H. Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Citations (Scopus)

Abstract

Any Corporate Governance aspect involves numerous steps when it comes to determining how efficient and effective an organization's governance implementations are. Cybersecurity Governance is not much different in this regard. As Cybersecurity Governance is a relatively new and very important concept, the idea of assessing the efficacy of Cybersecurity and Cybersecurity Governance implementation is still highly debated and researched. In this article, we discuss adaptations to a Cybersecurity Governance Maturity Model and we will also discuss a second and important aspect related to the Cybersecurity Governance Maturity assessment; reporting. We will discuss how the maturity model can be used to create descriptive and understandable reports for the various roles within the Board of Directors and Executive Management.

Original languageEnglish
Title of host publication2016 IST-Africa Conference, IST-Africa 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781905824557
DOIs
Publication statusPublished - 2 Aug 2016
Event2016 IST-Africa Conference, IST-Africa 2016 - Durban, South Africa
Duration: 11 May 201613 May 2016

Publication series

Name2016 IST-Africa Conference, IST-Africa 2016

Conference

Conference2016 IST-Africa Conference, IST-Africa 2016
Country/TerritorySouth Africa
CityDurban
Period11/05/1613/05/16

Keywords

  • Cyber Security
  • Cyber Security Governance
  • Cyber Security Maturity Model
  • ISO/IEC 27032:2012
  • Information Security
  • Information Security Governance
  • Information Technology
  • Maturity Model
  • Reporting Tool

ASJC Scopus subject areas

  • Sociology and Political Science
  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Cybersecurity Governance: How can we measure it?'. Together they form a unique fingerprint.

Cite this