Modelling Cyber Security Governance Maturity

Rossouw De Bruin, S. H. Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a "Cyber Security Governance Maturity dashboard", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.

Original languageEnglish
Title of host publication2015 IEEE International Symposium on Technology and Society, ISTAS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479982837
DOIs
Publication statusPublished - 22 Mar 2016
EventIEEE International Symposium on Technology and Society, ISTAS 2015 - Dublin, Ireland
Duration: 11 Nov 201512 Nov 2015

Publication series

NameInternational Symposium on Technology and Society, Proceedings
Volume2016-March

Conference

ConferenceIEEE International Symposium on Technology and Society, ISTAS 2015
Country/TerritoryIreland
CityDublin
Period11/11/1512/11/15

Keywords

  • Assessment Models
  • Cyber Security
  • Cyber Security Governance
  • Cyber Security Governance Dashboard
  • Maturity
  • Maturity Model
  • Security Dashboard

ASJC Scopus subject areas

  • General Engineering
  • General Social Sciences

Fingerprint

Dive into the research topics of 'Modelling Cyber Security Governance Maturity'. Together they form a unique fingerprint.

Cite this